期刊文献+

基于身份的移动网动态可认证群组密钥协商协议 被引量:1

Identity-based Dynamic Authenticated Group Key Agreement Protocol for Mobile Networks
下载PDF
导出
摘要 群组密钥协商是保证无线网络群组安全通信的重要工具之一。2007年,Tseng等提出一种适合无线移动网络的高效群组密钥协商协议。对Tseng协议安全性进行分析,发现Tseng协议不具备认证性,不能抵御主动攻击。因此,通过改进Tseng协议,提出一种新的动态可认证群组密钥协商协议。该协议基于身份的公钥密码体制,降低了建立和管理公钥基础设施的代价;同时,协议支持节点间的相互认证。分析结果表明:协议满足群组密钥所要求的安全准则,降低了普通节点的计算和通信成本。 Group key agreement is one of the important means to ensure group secure communication for wireless networks. In 2007, Tseng et al. proposed an efficient group key agreement protocol in wireless mobile environment. In this paper, by analyzing the security of the Tseng's protocol, the authors have found that the Tseng's protocol is not an authenticated protocol and cannot resist active attacks. By improving the Tseng's protocol, the authors propose a new dynamic authenticated group key agreement protocol. Due to using ID -based public key, the expense of building and managing public key infrastructure is decreased, and the protocol supports mutual authentication between nodes. The analysis results show that this protocol can satisfy the security rules of group key, mean-while, reduce the computation and communication cost of the ordinary nodes.
出处 《空军工程大学学报(自然科学版)》 CSCD 北大核心 2011年第5期67-71,共5页 Journal of Air Force Engineering University(Natural Science Edition)
基金 国家自然科学基金资助项目(60873233)
关键词 群组密钥协商 基于身份的公钥密码体制 认证 双线性对 :group key agreement protocol ID -base public key authentication bilinear pairing
  • 相关文献

参考文献10

  • 1Asokan N, Ginzboorg P. Key agreement in ad hoc networks[ J]. Computer communication, 2000, 23 (17) : 1627 -1637.
  • 2Hwang M S, Yang W P. Conference key distribution protocols for digital mobile communication systems[ J]. IEEE selected areas communication, 1995, 13 : 416 -420.
  • 3Dutta R, Barua R. Provably secure constant round contributory group key agreement in dynamic setting[ J]. IEEE trans on Information theory, 2008, 54 (5) : 2007 - 2025.
  • 4KIM Y, Perrig A, Tsudik G. Tree based group key agreement[J]. ACM trans on information system security, 2004, 7( 1 ) :60 -96.
  • 5Choi K Y, Hwang J Y, Lee D H. Efficient ID - based group key agreement with bilinear maps [ C ]//Proceeding of 2004 international workshop on practice and theory in public key cryptography(PKCIM) (LNCS2947). Berlin: Springer- verlag, 2004: 130 - 144.
  • 6钟欢,许春香.基于身份的多方认证组密钥协商协议[J].电子学报,2008,36(10):1869-1872. 被引量:4
  • 7Tang H, Zhu L, Zhang Z. Efficient ID -based two round authenticated group key agreement protocol [ C ]//WiCOM'08:4th international conference on wireless communication, networking and mobile computering. New York: IEEE press, 2008:1 - 4.
  • 8Boyd C, Nieto JMG. Round - optimal contributory conference key agreement [ C ]//Proceedings of public - key cryptography (LNCS2567). Berlin: Springer - verlag, 2003 : 161 - 174.
  • 9张串绒,肖国镇.基于签密技术的可认证密钥协商协议[J].空军工程大学学报(自然科学版),2006,7(6):65-67. 被引量:4
  • 10Tseng YM. A resource - constrained group key agreement protocol for imbalanced wireless networks [ J ]. Computer security, 2007, 26(4): 331 -333.

二级参考文献18

  • 1Boneh D, Franklin M. Identity-based Encryption from the weil Pairing[A]. In Proceedings of Crypto' 2001 [C]. Berlin: Springer- Verlag, 2001.213 - 229.
  • 2Joux A. One round protocol for tripartite Diffie-Hellman[ A ]. Proceedings of Algorithmic Number Theory Symposium[ C]. Berlin: Springer-Vedag,2000.385 - 394.
  • 3Smart N P. An Identity based authenticated Key Agreement protocol based on the Weil Pairing. Cryptography [R/OL ]. eprint Archive, http://eprint. iacr. org/2001/111.
  • 4Boneh D,Franklin M. Identity-based encryption from the Weil Pairing[ A ]. Advances in Cryptography-CRYPTO 2001 [C]. Berlin: Springer-Vedag, 2001:213 - 229.
  • 5Cocks C. An Identity based encryption scheme based on quadratic residues[ A]. Advances in Cryptography and Coding[ C ]. Berlin: Springer-Verlag, 2001. 360 - 363.
  • 6Sattam S, Kenneth A. Parterson G. Authenticated Three Party Key Agreement Protocols from Pairings[ OL ]. http://eprint. iacr. org/2002/035.
  • 7Boneh D, Silverberg A. Application of Mulfilinear forms to Cryptography[ OL ]. http://eprint. iacr. org/2002/080.
  • 8H K Lee,H S Lee,Y R Lee.Multi-party Authenticated Key Agreement Protocols from Multilinear Forms [R/OL ]. Cryptology ePrint Archive: http://eprint.iacr. org/2002/166.
  • 9H M Lee, K J Ha, K M Ku. ID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms[ A ]. Information Security, 8th Intemational Conference, ISC 2005 [ C ]. Berlin: Springer-Verlag, 2005. 104 - 117.
  • 10Steiner M, Tsudik G, Waidner M. Key agreement in dynamic peer groups[J]. IEEE Transactions on Parallel and Distribution System, 2000,11 (8) : 769 - 780.

共引文献6

同被引文献15

  • 1张串绒,肖国镇.基于签密技术的可认证密钥协商协议[J].空军工程大学学报(自然科学版),2006,7(6):65-67. 被引量:4
  • 2Bellare M, Canetti R, Krawczyk H. Keying Hash functions for message authentication [C]//CRYPTO 1996, LNCS 1109. Heidelberg.. Springer, 1996: 1-15.
  • 3Yasuda,K. HMAC without the "Second" key [C]// ISC 2009, LNCS 5735. Heidelberg.- Springer, 2009: 443-458.
  • 4Wei Wang. Equivalent Key Recovery Attack on H2- MAC Instantiated with MD5 [J]. Communications in computer and information science, 2011,200 : 11-20.
  • 5Liu Fanbao, Xie Tao, Shen Changxiang. Equivalent key recovery attack to H2 -MAC[J]. International journal of security and its application,2012,6(2) ..56- 61.
  • 6Contini S,YiN Y L. Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions [C]//ASIACRYPT 2006, LNCS 4284. Heidelberg.. Springer,2006 .. 37-53.
  • 7Rechberger C, Rijmen, V. New results on NMAC/ HMAC when instantiated with popular hash func- tions [J] .Journal of universal computer science, 2008, 14(3): 347-376.
  • 8Preneel B,Oorschot van P. MDx-MAC and building fast MACs from Hash functions [C]//CRYPTO 1995, LNCS963. Heidelberg:Springer, 1995: 1-14.
  • 9Wang X, Yu H, Wang W, et al. Cryptanalysis on HMAC/NMAC-MD5 and MDS-MAC [C]//EURO- CRYPT 2009, LNCS 5479. Heidelberg: Springer, 2009: 121-133.
  • 10Wang X, Wang W, Jia K, et al. New distinguishing attack on MAC using secret-prefix method[J]. Com- puter science,2009,5665 : 363-374.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部