期刊文献+

一种无证书认证密钥协商协议的分析与改进 被引量:2

Analysis and improvement certificateless authenticated key agreement protocol
下载PDF
导出
摘要 研究无证书公钥密码系统中两方认证密钥协商协议问题。对Liu xu的无证书两方认证密钥协商协议进行安全性分析,指出该方案不具有强安全性。该方案不能抵抗密钥泄露伪装攻击和临时私钥泄露攻击。分析了方案不安全的原因,在此基础上提出一个改进的方案来修正Liu xu的方案。因此,设计看似安全的无证书两方认证密钥协商协议并不困难,但要给出协议的安全性证明并不容易。 This paper studied two-party authenticated agreement protocol in the certificateless public setting.Analyzed the security of Liu-xu's certificateless authenticated two-party key agreement protocol,and it was shown that the scheme did not achieve strong security.The scheme was vulnerable to key compromise impersonation attack and leakage of ephemeral secrets attack.The reason why the attack can work was analyzed and proposed an improved scheme to remove the attack.It is not hard to devise certificateless authenticated two-party key agreement protocols that look secure,but making the proofs word is not always so simple.
作者 舒剑
出处 《计算机应用研究》 CSCD 北大核心 2012年第1期294-296,共3页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA012415)
关键词 认证 密钥协商 无证书密码学 强安全性 密钥泄露 authentication key agreement certificateless cryptography strong security key compromise
  • 相关文献

参考文献10

  • 1AL-RIYAMI S, PATERSON K. Certificateless public key cryptography[ C ]//Lecture Notes in Computer Science, vol 2894. [ S. l. ] : Springer-Verlag, 2003:452-473.
  • 2MANDT T, CHIK H. Certicateless authenticated two-party key agreement protocols[ C ]// Lecture Notes in Computer Science, vol 4435, [ S. l. ] : Springer-Verlag,2006:37-44.
  • 3XIA Liang,WANG Shengbao,SHEN Jiajun,XU Guoming.Breaking and Repairing the Certificateless Key Agreement Protocol from ASIAN 2006[J].Wuhan University Journal of Natural Sciences,2008,13(5):562-566. 被引量:8
  • 4朱辉,李晖,谭示崇,王育民.不使用双线性对的无证书认证协议[J].武汉大学学报(信息科学版),2010,35(5):574-577. 被引量:7
  • 5SWANSON C, DAVID J. A study of two-party certificateless authenticated key-agreement protocols[ C ]//Lecture Notes in Computer Science, vol 5922. [ S. l. ] : Springer-Verlag, 2009 : 57- 71.
  • 6LIPPOLD G, BOYD C, NIETO J G. Strongly secure certificateless key agreement[ C ]//Lecture Notes in Computer Science, vol 5671. [ S. l. ] : Spfinger-Verlag, 2009:206- 230.
  • 7CASH D, KILTZ E, SHOUP V. The twin diffie-hellman problem and applications [ C ]//Lecture Notes in Computer Science, vol 4965. [ S. l. ] : Springer-verlag, 2008 : 127-145.
  • 8CASH D, KILTZ E, SHOUP V. The twin diffie-hellman problem and applications [ C ]//Lecture Notes in Computer Science, vol 4965. 2008 : 127-145.
  • 9舒剑.一种实用的无证书两方认证协议[J].小型微型计算机系统,2010,31(9):1889-1893. 被引量:11
  • 10刘文浩,许春香.制造网格环境下无证书密钥协商方案[J].计算机集成制造系统,2011,17(1):208-215. 被引量:4

二级参考文献34

  • 1叶作亮,顾新建,钱亚东,祁国宁.制造网格——网格技术在制造业中的应用[J].中国机械工程,2004,15(19):1717-1720. 被引量:30
  • 2SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 3WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 4SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 5Al-Riyami S, Paterson K. Certificateless public key cryptography [ C]. Proceedings of the Asiacrypt 2003, Lecture Notes in Computer Science 2894, Taipei, Taiwan: Spdnger-Vedag, 2003 : 452- 473.
  • 6Tarjei K Mandt, Chik How Tan. Certieateless authenticated twoparty key agreement protocols [ C ]. Proceedings of the ASIAN 2006, Lecture Notes in Computer Science 4435, Tokyo, Japan: Springer-Verlag ,2006 : 3744.
  • 7LaMacchia B A, Lauter K, Mityagin A. Stronger security of authenticated key exchange [ C ]. Proceedings of the ProvSec 2007, Lecture Notes in Computer Science 4784, Wollongong, Australia: Springer-Verlag, 2007,1 -16.
  • 8Swanson C M. Security in key agreement: two-party certificateless schemes[ D/OL]. http://uwspace. uwaterloo. ca/bitstream/10012 /4156/1/Swanson_Colleen. pdf, 2008. Master Thesis, University of Waterloo, 2009-01-29.
  • 9Lippold G, Boyd C, Nieto J G. Strongly secure certificateless key agreement[ C]. Proceedings of the Pairing 2009, Lecture Notes in Computer Science 5671, Ca, USA: Springer-Verlag, 2009, 206- 230.
  • 10Cash D, Kiltz E, shoup V. The twin diffie-hcllman problem and applications[ C]. Proceedings of the EUROCRYPT 2008. LNCS 4965. Istanbul, Turkey: Springer-verlag, 2008, 127-145.

共引文献22

同被引文献22

  • 1WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 2SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 3HTTP over TLS [EB/OL]. (2000-05-01) [2014-03-10] http ://www. ietf. org/rfc/rfc2818.txt.
  • 4Intemet X.509 public key infrastructure certificate and certificate revocation list(CRL)profile [EB/OL]. (2008- 05-01 )[2014-03-10 ].http://tools.ietf. org/html/rfc5280.
  • 5The Secure Sockets Layer(SSL)protocol version 3.0[ EB/OL]. (2011-08-01 ) [2014-03-11 ]. http://tools, ieff. org/html/rfc6101.
  • 6Representation and verification of domain-based applica- tion service identity within lnternet public key infrastruc- ture using X. 509 (PKIX) certificates in the context of Transport Layer Security (TLS) [EB/OL]. (2011-03-01 ) [2014-03 - 11 ]. http://tools, ietf. org/html/rfc6125.
  • 7https should cheek CN of x509 eert[EB/OL].(2007-04- 22) [2014-03-12 ]. bttps://issues, apache, org/jira/browse/ HTTPCLIENT-613.
  • 8Iraemet X. 509 public key infrastructure certificate policy and certification practices frarnework[EB/OL]. (1999-03-01) [2014-03-11 ]. http://www, ietf. org/rfc/ rfc2527.txt.
  • 9Viega J,Messier M. Secure programming cookbook for C and C + + [M].Ca|ifomia:O'Reilly Media.
  • 10Moxie M.IE SSL vulnerability[EB/OL].(2002-05-08) [2014-03-12 ]. http://www, thoughtcrime, org/ie-ss003.l- chain.txt.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部