期刊文献+

一种改进的双线性对的双向基于身份的认证密钥协商协议 被引量:1

下载PDF
导出
摘要 使用对的双向认证密钥协商协议已经在密码领域得到了广泛的关注,过去提出的一些这种类型的协议大多数是有缺陷的,这导致了协议被攻击或者无法保证其安全性。在本文中,我们利用一种签名方案的变体,提出了一种有效的、使用线性对的且基于身份的认证密钥协商协议,并证明了其安全性。此外,和现有的一些协议相比,我们所给出的协议更安全有效。
出处 《信息通信》 2012年第1期129-130,共2页 Information & Communications
  • 相关文献

参考文献5

  • 1D.Boneh,M.Franklin,Identity-based encryption from theWeil pairing,SIAM J.Comput.32(3)(2003)586–615.
  • 2F.Hess,Efficient identity based signature schemes based onpairings,in:Selected Areas in Cryptography–SAC01,in:Lecture Notes in Comput.Sci.,vol.2595,Springer,NewYork,2003,pp.310-324.
  • 3N.P.Smart,Identity-based authenticated key agreement pro-tocol based on Weil pairing,Electronics Lett.38(13)(2002)630-632.
  • 4K.Shim,Efficient ID-based authenticated key agreementprotocol based on Weil pairing,Electronics Lett.39(8)(2003)653-654.
  • 5Y.Wang,Efficient identity-based and authenticated keyagreement protocol,Cryptology ePrint Archive Re-port2005/108,2005.

同被引文献20

  • 1王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议[J].计算机学报,2007,30(10):1842-1852. 被引量:42
  • 2Diffie W, Hellman M E. New directions in cryptography [ J ]. IEEE Trans Info Theory,1976,22(6) :44-654.
  • 3Shamir A. Identity-based cryptosystems and signature schemes [ C ]// Advances in Cryptology--Crypto1984, Berlin: Springer-Verlag, 1984 : 47 - 53.
  • 4Boneh D, Franklin M. Identity based encryption from the Weil pairing [ C ]//Advances in Cryptology--Crypto 2001, Berlin: Springer-Verlag, 2001:213 -229.
  • 5Yuan Q, Li S. A new efficient ID-based authenticated key agreement protocol[ EB/OL]. 2011-6-5. (2005-08-29). [2009-08-25]. http:// Cryptology ePrint Archive2005/309.
  • 6Ni L, Chen G, Li J, et al. Strongly secure identity-based authenticated key agreement protoeols [ J ]. Computers and Electrical Engineering, 2011,37(2) :205 -217.
  • 7Cao X, Kou W, Du X. A pairing-free identity-based authenticated key agreement protocol with mirnimal message exchanges [ J]. Information Sciences, 2010,180 ( 15 ) : 2895 - 2903.
  • 8He D, Chen J, Hu J. A new provably secure authenticated key agree- ment protocol without blinear pairings [ J ]. JOURNAL of Information & Computartional Science ,2010,7 (5) :1089 - 1096.
  • 9Blakewlson S, Johnson C, Menezes A. Key agreement protocols and their security analysis [ C ]//Proceedings of the 6th IMA International Conference on Cryptography and Coding, Berlin, 1997:30 - 45.
  • 10Chen L, Kulda C. Identity based authenticated key agreement protocols from pairing[ C ]//Proceedings of 16th IEEE Computer Security Foun- dations Workshop, New York, 2003:219 - 233.

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部