期刊文献+

标准模型下可证安全的认证密钥协商协议 被引量:1

Provable secure authenticated key exchange protocol under standard model
下载PDF
导出
摘要 提出了一个标准模型下的基于身份认证的密钥协商协议。协议的设计采用了双线性配对的思想,协议的安全性分析,则综合运用了串空间知识以及可证安全中Game证明的方法,给出了严格的证明。协议具有良好的前向安全性和会话密钥无托管性,通过利用显式的身份认证,提高了协议的执行效率。与随机预言模型中的协议相比,在计算和通信效率方面相当。 This paper presents an identity-based authenticated key exchange protocol in the standard model.Protocol design isinspired by bilinear pairings.Strand space knowledge and Game method in provable security are comprehensively used.Thecorrectness of the protocol is analysed and a strict proof is given.The protocol has good forward security and session keynon-hosting.At the same time,through the explicit authentication,it improves the efficiency of the implementation of the pro-tocol.Compared with the protocol in the random oracle model,the protocol has the same computational and communicationefficiencies.
出处 《计算机工程与应用》 CSCD 北大核心 2011年第13期106-109,共4页 Computer Engineering and Applications
基金 通信技术重点实验室基金No.9140C1103040902~~
关键词 认证密钥协商 可证安全 串空间 双线性配对 标准模型 authenticated key exchange provable security strand space bilinear pairings standard model
  • 相关文献

参考文献9

  • 1Bellare M,Rogaway P.Entity authentication and key distribu tion[C] //LNCS 773:Proc of Advances in Cryptology-Crypto 1993.Berlin:Springer-Verlag,1993:110-125.
  • 2Shim K.Efficient ID-based authenticated key agreement protocol beard on Weft pairing[J].Electronic Letters,2003,39(8):653-654.
  • 3Chole Y J,Jeong E,Lee E.Efficient identity-based authenticated key agreement protocl from pairing[J].Journal of Applied Mathematics,and Computation,2005,162(1):179-188.
  • 4Gentry,C.Practical identity-based encryption without random oracles[C] //LNCS 4004:Proceedings of the EUROCRYPT' 06.Berlin:Springer-Verlag,2006:445-464.
  • 5Boyko V,MacKenzie P D,Patel S.Provably secure passwordo-authenticated key exchange using Diffie-Hellman[C] //LNCS 1870:Preneel B.Advances in Cryptology-EUROCRYPT 2000.Berlin:Springer-Verlag,2000:156-171.
  • 6田海博,Willy Susilo,明洋,王育民.A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles[J].Journal of Computer Science & Technology,2008,23(5):832-842. 被引量:4
  • 7Thayer F J,Herzog J C,Guttman J D.Strand spaces:Honest ideals on strand soaces[C] //Proceedmgs of the 1998 IEEE Computer Security Foundations Workshop.Los Alamitos:IEEE Computer Society Press,1998:66-77.
  • 8Guttman J D,Thayere F J.Authentication tests[C] //Proccedings of the 2000 IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society Press,2000:150-164.
  • 9Bellare M,Pointcheval D,Rogaway EAuthenticated key exchange secure against dictionary attacks[C] //LNCS 1807:Proc of Advances in Cryptology-Eurocrypt 2000.Berlin:Springer-Veslag,2000:139-155.

二级参考文献32

  • 1A J Menezes, P C van Oorscbot, S A Vanstone. Handbook of Applied Cryptography. CRC Press, 1997.
  • 2Shamir A. Identity-based cryptosystems and signatures schemes. In Proc. Advanced in Cryptography (Crypto'84), Santa Barbara, CA, USA, Blakey G T, Chaum D (eds.), LNCS 196, Spring-Verlag, 1985, pp.48-53.
  • 3Okamoto E. Proposal for identity-based key distribution system. Electronics Letters, 1986, 22(24): 1283 1284.
  • 4Girault M, Pailles J. An identity-based scheme providing zeroknowledge authentication and authenticated key exchange. In Proc. 1st European Symposium on Research in Computer Security (ESORICS 90), Toulouse, France, 1990, pp.173-184.
  • 5Tanaka K, Okamoto E. Key distribution system for mail systems using ID-related information directory. Computers and Security, 1991, 10(1): 25-33.
  • 6Smart N P. IdentitCbased authenticated key agreement protocol based on Weil pairing. Electronics Letters, 2002, 38(13): 630-632.
  • 7Chen L, Kudla C. Identity based authenticated key agreement protocols from pairing. In Proc. 16th IEEE Security Foundations Workshop, Pacific Grove, CA, USA, IEEE Computer Society Press, 2003, pp.219-233.
  • 8Scott M. Authenticated ID-based key exchange and remote log-in with insecure token and PIN number. Cryptography ePrint Archive, 2002/164, 2002.
  • 9Shim K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters, 2003, 39(8): 653-654.
  • 10McCullagh P, Barreto P. A new two-party identity-based authenticated key agreement. In Proc. CT-RSA 2005, San Francisco, CA, USA, LNCS 3376, Springer-Verlag, 2005, pp.262-274.

共引文献3

同被引文献20

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部