期刊文献+

可证明安全的群组匿名认证密钥协商协议 被引量:3

Provably Secure Anonymous Authentication Key Agreement Protocol for Multicast Group
下载PDF
导出
摘要 基于BDH困难问题,借鉴环签密方案的思想,提出了一种有效的群组匿名认证密钥协商方案。该方案首先在实现群组成员认证的前提下,协商出安全的会话密钥;对群组内外实现了不同程度的匿名,即群组之外的用户完全不能获悉参与协商的成员组成,群组内的成员了解参与协商的成员组成,但不能识别成员的身份信息;支持节点的动态群组密钥更新,实现了群组密钥的前向保密与后向保密;仅通过一轮交互确定会话密钥,降低了计算复杂性、减小了存储开销。 With the idea of ring signcryption, an efficient anonymous group key agreement scheme is presented based on the Bilinear Diffie-Hellman (BDH) assumption. The scheme establishes a secure group key under the premise of authenticating group members. For both internal and external group members the scheme achieves different degree of anonymity, that is, the external users can absolutely not learn any information about the internal membership structure, and the internal users only can find out the member composition but cannot recognize the identity of any member. In order to achieve the forward security and backward security of group key, new scheme supports group members to renew their group key when the external nodes join the group or the internal members leave the group. The proposed scheme can establish the group session key through only one round, and therefore, its computation complexity and storage cost are efficiently reduced.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2011年第2期273-277,共5页 Journal of University of Electronic Science and Technology of China
基金 国家863计划(2007AA01Z429) 国家自然科学基金(60702059 60972078) 甘肃省自然科学基金(2007GS04823) 网络安全与密码技术福建省高校重点实验室开放课题(09A006)
关键词 认证协议 匿名技术 群组技术 密钥协商协议 网络安全 网络协议 authentication anonymity group technology key agreement network security network protocols
  • 相关文献

参考文献5

二级参考文献32

  • 1[1]G Horn,B Preneel.Authentication and payment in future mobile systems [A].In Computer Security--ESORICS'98 Proceedings [C].Berlin:Springer-Verlag,1998.
  • 2[2]G Horn,K M Martin,C J Mitchell.Authentication protocols for mobile network environment value added services [EB/OL].http://isg.rhbnc.sc.uk/c jm/Listofpublications.
  • 3[3]A Mehrotra.Mobility and security management in the GSM system and some proposed future improvements [A].Proceedings of the IEEE [C].USA:IEEE,1998.
  • 4[4]V Shoup.On formal modules for secure key exchange [R].IBM Research Report RZ 3120,1999,http://www.shoup.net/papers
  • 5[5]D G Park,C Boyd,S J Moon.Forward secrecy and its application to future mobile communiations security [A].PKCS2000,LNCS 1751 [C].Melbourne,Australia:PKCS,2000.
  • 6[6]Mitchell,C J,Ward,M,Wilson,P.Key control in key agreement protocols [J].Electronics Letters,1998,34:980-981.
  • 7Mohammed G R, Hideki I. Security in wireless communication[J]. Wireless Personal Communications, 2002, 22(2):213-228.
  • 8Molva R, Samfat D, Tsudik G. Authentication of mobile users[J]. IEEE Network Special Issue in Mobile Communication, 1994, 8(2): 26-34?A.
  • 93GPP TS21.133, 3G Security: Security Threats and Requirements[S]. Release 2000, 14-15.?A?A
  • 101Rahnema M. Overview of GSM system and protocol architecture[J]. IEEE Communications Magazine, 1993,31(4):92 - 100.

共引文献23

同被引文献38

  • 1孙海波,林东岱.基于零知识集的群组密钥分配方案[J].电子学报,2005,33(2):345-349. 被引量:4
  • 2Rafaeli S, Hutchison D. A survey of key management for secure group communication [J]. ACM Computing Surveys, 2003, 35(3): 309-329.
  • 3Zhao Xingwen, Zhang Fangguo, Tian Haibo. Dynamic asymmetric group key agreement for ad hoc networks [J]. Ad Hoc Networks, 2011, 9(5): 928-939.
  • 4Cao X, Kou W, Du X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15): 2895- 2903.
  • 5Chang Tingyi, Hwang Minshiang, Yang Weipang. A communication efficient three-party password authenticated key exchange protocol [J]. Information Sciences, 2011, 181 (1): 217-226.
  • 6Guo Hua, Li Zhoujun, Mu Yi, et al. Provably secure identity based authenticated key agreement protocols with malicious private key generators [J]. Information Sciences, 2011, 181(3):628-647.
  • 7Zhang L, Zhang F, Wu Q, et al. Simulatable certificateless two-party authenticated key agreement protocol[J]. Information Sciences, 2010, 180(6): 1020-1030.
  • 8Just M, Vaudenay S. Authenticated multi-party key agreement [G] //LNCS 1163: Proc of the 1996 Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 1996: 36-49.
  • 9Burmester M, Desmedt Y. A secure and scalable group key exchange system [J]. Information Processing Letters, 2005, 94(3): 137-143.
  • 10Bohli JM, Glas B, Steinwandt R. Towards provably secure group key agreement building on group theory [G] //LNCS 4341: Proc of Cryptology-VIETCRYPT. Berlin: Springer, 2006:322-336.

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部