期刊文献+

一种无证书两方密钥协商方案的分析与改进

Analysis and improvement of certificateless two-party key agreement scheme
下载PDF
导出
摘要 基于签密方案,Liu-Xu构造了一个高效的无证书两方认证密钥协商协议。对Liu-Xu的方案进行安全性分析,指出由于传送消息存在冗余,该方案不具有强安全性。该方案不能抵抗被动攻击和主动攻击。提出一个改进的方案来修正上述问题,新方案没有使用签密方案。分析结果表明,新协议的效率和安全性提高明显。 Based on signcryption scheme,Liu-Xu proposes an efficient certificateless authenticated two-party key agreement protocol.Security analysis shows that the scheme hasn't achieved strong security due to redundancy of the exchange messages.The scheme is vulnerable to passive attack and active attack.To overcome the problem mentioned above,an improved scheme without using signcryption scheme is proposed.Analysis result proves that the efficiency and security of the proposed protocol is improved.
作者 舒剑
出处 《计算机工程与应用》 CSCD 2012年第3期21-23,共3页 Computer Engineering and Applications
基金 国家高技术研究发展计划(863)(No.2009AA012415)
关键词 签密 密钥协商 强安全性 冗余 被动攻击 主动攻击 signcryption key agreement strong security redundancy passive attack active attack
  • 相关文献

参考文献15

  • 1AI-Riyami S, Paterson K.Certificateless public key cryptography[C]// Lecture Notes in Computer Science 2894: Proceedings of the Asiacrypt 2003.Taipei, Taiwan, China: Springer-Verlag, 2003: 452-473.
  • 2Mandt T, Chik H.Certicateless authenticated two-party key agreement protocols[C]//Lecture Notes in Computer Science 4435: Proceedings of the ASIAN 2006.Tokyo, Japan: Springer-Verlag, 2006: 37-44,.
  • 3Xia L, Wang S B, Shen J.Breaking and repairing the certificateless key agreement protocol from ASIAN 2006[J].Wuhan University Journal of Natural Science, 2006,13 (5) : 562-566.
  • 4WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:23
  • 5SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 6SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 7Cao M, Zhang F T.Key-compromise impersonation attacks on some certificateless key agreement protocols and two improved protocols[C]//Proceedings of the First International Workshop on Education Technology and Computer Science 2009.Cam- bridge:IEEE Computer Society,2009:62-66.
  • 8Wang F J, Zhang Y Q.A new provably secure authentication and key agreement mechanism for SIP using certificateless pub- lic-key cryptography[EB/OL]. (2007) .http://eprint.iacr.org/.
  • 9Swanson C D J.A study of two-party certificateless authenticated key-agreement protocols[C]//Lecture Notes in Computer Science 5922:Proceedings of INDOCRYPT 2009.Newdelhi,India:Springer- Verlag, 2009: 57-71.
  • 10Lippold G, Boyd C,Nieto J G.Strongly secure certificateless key agreement[C]//Lecture Notes in Computer Science 5671: Pro- ceedings of the Pairing 2009.Ca, USA: Springer-Verlag, 2009: 206-230.

二级参考文献45

  • 1叶作亮,顾新建,钱亚东,祁国宁.制造网格——网格技术在制造业中的应用[J].中国机械工程,2004,15(19):1717-1720. 被引量:30
  • 2SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 3WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:23
  • 4SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 5Al-Riyami S, Paterson K. Certificateless public key cryptography [ C]. Proceedings of the Asiacrypt 2003, Lecture Notes in Computer Science 2894, Taipei, Taiwan: Spdnger-Vedag, 2003 : 452- 473.
  • 6Tarjei K Mandt, Chik How Tan. Certieateless authenticated twoparty key agreement protocols [ C ]. Proceedings of the ASIAN 2006, Lecture Notes in Computer Science 4435, Tokyo, Japan: Springer-Verlag ,2006 : 3744.
  • 7LaMacchia B A, Lauter K, Mityagin A. Stronger security of authenticated key exchange [ C ]. Proceedings of the ProvSec 2007, Lecture Notes in Computer Science 4784, Wollongong, Australia: Springer-Verlag, 2007,1 -16.
  • 8Swanson C M. Security in key agreement: two-party certificateless schemes[ D/OL]. http://uwspace. uwaterloo. ca/bitstream/10012 /4156/1/Swanson_Colleen. pdf, 2008. Master Thesis, University of Waterloo, 2009-01-29.
  • 9Lippold G, Boyd C, Nieto J G. Strongly secure certificateless key agreement[ C]. Proceedings of the Pairing 2009, Lecture Notes in Computer Science 5671, Ca, USA: Springer-Verlag, 2009, 206- 230.
  • 10Cash D, Kiltz E, shoup V. The twin diffie-hcllman problem and applications[ C]. Proceedings of the EUROCRYPT 2008. LNCS 4965. Istanbul, Turkey: Springer-verlag, 2008, 127-145.

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部