期刊文献+

一种有效的基于身份的两方密钥交换协议 被引量:1

An Efficient ID-based Two-party Key Exchange Protocol
下载PDF
导出
摘要 基于身份的密钥交换协议通过协议参与者的身份信息来建立会话密钥。文章基于计算离散对数困难问题,提出一种基于身份的两方密钥交换协议,并对协议的效率和安全性进行了分析。分析表明,所提出的协议具有较好的运行效率,能满足两方密钥交换协议的安全属性要求。 ID-based protocols are used to establish session keys with identity information of principals.An ID-based key exchange protocol was proposed based on the difficulty of computing a discrete logarithm problem,and the performance and security of the proposed protocol were analyzed.The analysis shows that the proposed protocol has better performance and it can satisfy the security requirements of the two-party key exchange protocol.
作者 项顺伯
出处 《信息网络安全》 2012年第2期53-54,共2页 Netinfo Security
关键词 基于身份 密钥交换 离散对数问题 会话密钥 已知密钥安全 ID-based key exchange discrete logarithm problem session key known-key security
  • 相关文献

参考文献10

  • 1W.Diffie, M.E.Hellman. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976,22(6):644-654.
  • 2ANSI X9.63. Public key cryptography for the financial services industry: Key agreement and key transport using elliptic curve cryptography[R]. ANSI. Working draft. 2001.
  • 3Tseng Y.M. Robust generalized MQV key agreement protocol without using one-way hash functions[J]. Computer Standards & Interfaces, 2002, 24(3): 241-246.
  • 4Gunther C. An identity-based key-exchange protocol[C]. In Advances in Cryptology-Eurocrypt' 89, Lecture Notes in Computer Science. Springer-Verlag, 1990, 434:29-37.
  • 5Kaeednia S. Improvement of Gunther' s identity-based key exchange protocol[J]. Electronics Letters, 2000, 36(18):1535-1536.
  • 6Hsieh B.T., H.M. Sun ,T. Hwang et al. Lin. An improvement of Saeednia' s identity-based key exchange protocol[C]. In Information Security Conference 2002.2002: 41-43.
  • 7Tseng Y.M., J.K.,Jan C.H.Wang. Cryptanalysis and improvement of an identity-based key exchange protocol[J]. Journal of Computers, 2002,14(3):17-22.
  • 8Tseng Y.M. An Efficient Two-Party Identity-Based Key Exchange Protocol[J]. INFORMATICA, 2007, 18(1):125-136.
  • 9M.Hilbl, T.Welzer, B.Brumen. Improvement of the Peyravian-Jefffies's user authentication protocol and password change protocol[J]. Computer Communications, 2008, 31(10):1945-1951.
  • 10Yalin Chen, Jue-Sam Chou, Chun-Hui Huang. Comment on four two-party authentication protocols[EB/OL], http://eprint.iacr. org/2010/165.

同被引文献2

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部