期刊文献+

一种可证明安全的ID-AKA协议

Security-provable Identity-based Authenticated Key Agreement Protocol
下载PDF
导出
摘要 基于身份的认证密钥协商(ID-AKA)协议大多效率低下、安全性较低。针对该问题,提出一个新的ID-AKA协议。利用模块化的方法证明新协议在mBR模型满足抗密钥泄露模仿攻击、完美前向安全性以及PKG-前向安全性。新协议还满足抗临时秘密泄露攻击。与同安全级别的协议相比,新协议的效率更高。 Most Identity-based Authenticated Key Agreement(ID-AKA) protocols have poor performance on security and the efficiency. To solve this problem, this paper presents an improved ID-AKA protocol. Security proof with the modular approach in the mBR model is provided, which means the new protocol satisfies perfect forward security, PKG forward security, resistant to key-compromise impersonation. Furthermore, the new protocol can satisfy resistance to leakage of ephemeral secrets. Compared with previous ID-AKA protocols which can satisfy the same security properties, the new protocol has higher efficiency.
出处 《计算机工程》 CAS CSCD 2012年第9期144-147,165,共5页 Computer Engineering
基金 河南省科技攻关计划基金资助项目(102102210493)
关键词 基于身份的认证密钥协商协议 可证明安全 模块化方法 双线性对 前向安全性 Identity-based Authenticated Key Agreement(ID-AKA) protocol security-provable modular approach bilinear parings ForwardSecurity(FS)
  • 相关文献

参考文献9

  • 1Shamir A.Identity-based Cryptosystems and SignatureSchemes[C]//Proc.of CRYPTO’84.Berlin,Germany:Springer-Verlag,1984:47-53.
  • 2Smart N P.ID-based Authenticated Key Agreement Protocol Basedon the Weil Pairings[J].Electronic Letters,2002,38(13):630-632.
  • 3Blake-Wilson S,Johnson C,Menezes A.Key Agreement Protocolsand Their Security Analysis[C]//Proc.of the 6th IMA InternationalConference on Cryptography and Coding.Berlin,Germany:Springer-Verlag,1997:30-45.
  • 4Chen Liqun,Kulda C.Identity-based Authenticated KeyAgreement Protocols from Pairing[C]//Proc.of the 16th IEEEComputer Security Foundations Workshop.[S.l.]:IEEE Press,2002:219-233.
  • 5Chen Liqun,Cheng Zhaohui,Smart N.Identity-based KeyAgreement Protocols from Pairings[J].International Journal ofInformation Security,2007,6(4):213-241.
  • 6Kudla C,Paterson K.Modular Security Proofs for Key AgreementProtocols[C]//Proc.of ASIACRYPT’05.Berlin,Germany:Springer-Verlag,2005:549-565.
  • 7丁辉,殷新春.一种新的基于身份的认证密钥协商协议[J].计算机工程,2010,36(23):127-129. 被引量:7
  • 8McCullagh N,Paulo S,Barreto M.A New Two-party Identity-based Authenticated Key Agreement[C]//Proc.of CT-RSA’05.Berlin,Germany:Springer-Verlag,2005.
  • 9Huang Hai,Cao Zhenfu.An Identity-based Authenticated KeyExchange Protocol Based on Bilinear Diffie-Hellman Problem[C]//Proc.of the 4th International Symposium on Information,Computer,and Communications Security.[S.l.]:ACM Press,2009.

二级参考文献8

  • 1Boneh D, Franklin M Identity-based Encryption from the Weil Pairing[C]//Proc. of CRYPTO ' 01. Berlin, Germany: Springer-Verlag, 2001.
  • 2Smart N. An ID-based Authenticated Key Agreement Protocol Based on the Well Pairing [J]. Electronic Letters, 2002, 38(13) : 630-632.
  • 3Gentry C. Practical Identity-based Encryption Without Random Oracles[C]//Proc. of EUROCRYPT' 06. Berlin, Germany: Springer-Verlag, 2006.
  • 4Xu Peng, Cui Guohua. An Efficient and Provably Secure IBE Scheme with Short System Parameters[C]//Proc. of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. Dalian, China: [s. n. ], 2008.
  • 5Chen Liqun, Cheng Zhaohui, Smart N P. Identity based Key Agreement Protocols from Pairings[J]. International Journal of Information Security, 2006, 6(4): 213-241.
  • 6McCullagh N, Paulo S L, Barreto M. A New Two-party Identity-based Authenticated Key Agreement [C]//Proc. of CTRSA'05. Berlin, Germany: Springer-Verlag, 2005.
  • 7王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议[J].计算机学报,2007,30(10):1842-1852. 被引量:42
  • 8苏仁旺.基于身份的认证密钥协商协议密码分析[J].计算机工程,2008,34(8):172-173. 被引量:4

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部