期刊文献+

对一个认证密钥协商协议的分析与改进

Analysis and Improvement of an Authenticated Key Agreement Protocol
下载PDF
导出
摘要 认证密钥协商协议是一种重要的安全协议,然而设计安全的此类协议却是十分困难的。本文分析了陈铁明等人于2008年提出的一个认证密钥协商协议,指出该协议不能抵抗密钥泄露伪装攻击。首先给出了具体攻击方法,然后在原有协议的基础上提出了一个新的改进协议,最后对改进协议的安全性质进行了分析。分析表明,改进协议满足较高的安全性,提供了已知密钥安全、完善前向安全、抗密钥泄露伪装攻击、未知密钥共享以及无密钥控制等安全属性,并且改进协议在计算效率和安全性方面取得了较好平衡,更加适合实际网络通信需要。 The authenticated key agreement protocol proposed by Chen et al. does not have the prop- erty of Key Compromise Impersonation (KCI) resilience. This paper conducts a detailed analysis on the flaw. To avoid this shortcoming, an improvement of the protocol is proposed based on the original scheme. This scheme permits two communicating sides to authenticate each other's identity and agree the session key fairly. This protocol has better security characteristics and efficiency.
出处 《计算机工程与科学》 CSCD 北大核心 2011年第11期32-35,共4页 Computer Engineering & Science
关键词 认证 密钥协商协议 双线性对 抗密钥泄露伪装攻击 authentication key agreement protocol bilinear pairing key-compromise impersonation resilience
  • 相关文献

参考文献8

  • 1Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans on Information Theory, 1976, 22(6):644-654.
  • 2Shamir A. Identity-Based Cryptosystems and Signature Schemes [C]//Proc of CRYPTO' 84,1984 : 47-53.
  • 3Boneh,Frankl N M. Identity-Based Encryption from the Weil Pairing[C]//Proc of CRYPTO'01,2001:213-229.
  • 4Smart N P. An Identity Based Authenticated Key Agreement Protocol Based on the Weil Pairing[J]. Electronics Letters, 2002, 38(13):630- 632.
  • 5Chen I., Kudla C. Identity Based Authenticated Key Agree- ment Protocols from Pairings[C]//Proc of the 16th IEEE Computer Security Foundations Workshop,2002:213-219.
  • 6陈铁明,叶敏克,蔡家楣.基于双线性对的可认证密钥协商协议[J].计算机科学,2008,35(11):110-112. 被引量:3
  • 7Blake-Wilson S. Key Agreement Protocols and Their Security Analysis[C]//Proc of the 6th IMA International Confer- ence on Cryptography and Coding, 1997:30-45.
  • 8Law L, Menezes A, Qu M, et al. An Efficient Protocol forAuthenticated Key Agreement [J]. Designs, Codes and Cryptography, 2003,28(2) : 119-134.

二级参考文献13

  • 1姚刚,冯登国.基于Weil对的成对密钥协商协议(英文)[J].软件学报,2006,17(4):907-914. 被引量:7
  • 2Wilson S B, Johnson D, Menenes A. Key Agreement Protocols and their Security Analysis//The 6^th IMA International Conference on Cryptography and Coding. LNCS Vol. 1355. Springer- Verlage, 1997 : 30-45
  • 3Diffie W, Hetlman M E. New directions in cryptography. IEEE Transactions on Information Theory, 1976,22: 644-654
  • 4LiC K,Chen qun. Identity Based Authenticated Key Agreement Protocols from Pairings. Hewlett-Packard Laboratories, Bristol, 2002
  • 5Shamir A. Identity based cryptosystems and signature schemes//Lecture Notes in Computer Science. 1984,196:47-53
  • 6Dan Boneh M F. Identity-Based Encryption from the Weil Pairing//The Proceedings of Crypto. Springer-Verlag, 2001,2139: 213-229
  • 7Smart N P. An identity based authenticated key agreement protocol based on the Well pairing. Electronics Letters, 2002, 38: 630-632
  • 8Li S,Yuan Q. A New Efficient ID-Based Authenticated Key Agreement Protocol. School of Mathematical Sciences. Peking University, Beijing: 2005
  • 9Ryu E, Yoon E, Yoo K. An Efficient ID- Based Authenticated Key Agreement Protocol//Networking 2004. 2004,3042
  • 10Wang Y. IEEE 1363. 3 Submission: Implicitly Authenticated ID- Based Key Agreement Protocol. UNC Charlotte

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部