期刊文献+

基于签密的认证密钥协商协议分析与改进 被引量:1

Analysis and Improvement of Authenticated Key Agreement Protocol Based on Signcryption
下载PDF
导出
摘要 针对LLH协议不能抵抗伪装攻击的问题,提出一个改进的基于签密的认证密钥协商协议。在计算性Diffie-Hellman问题假设下,利用椭圆曲线密码体制将认证与会话密钥相结合,由此实现协议的双向认证和密钥确认,增强协议的安全性。理论分析结果表明,该协议具有强安全特性,可以抵抗伪装攻击。 The key establishment protocol called LLH can not resist impersonation attack.Aiming at this problem,an improved protocol based on signcryption is proposed.It uses elliptic curve cryptosystem technology under the computational Diffie-Hellman assumption,combines authentication and session key and implements the functions of mutual authentication and key confirmation,so that the security is enhanced.Theoretical analysis results show that the proposed protocol has strong security features and can be resistant to impersonation attack.
作者 舒剑
出处 《计算机工程》 CAS CSCD 2012年第10期117-119,共3页 Computer Engineering
基金 国家自然科学基金资助项目(61163053)
关键词 密钥协商 伪装攻击 签密 LLH方案 双向认证 强安全性 key agreement impersonation attack signcryption LLH scheme mutual authentication strong security
  • 相关文献

参考文献11

  • 1Diffie W,Hellman M E.New Directions in Cryptography[J].IEEE Transaction on Information Theory,1976,22(6):644-654.
  • 2Diffie W,Oorschot V,Wiener M J.Authentication and Authenticated Key Exchanges[J]. Designs, Codes and Cryptography,1992,30(3):107-125.
  • 3Canetti R.Krawczyk H.Analysis of Key-exchange Protocols and Their Use for Building Secure Channels[EB/OL].[2011-04-08].http://eprint.icar.org/2001/040.
  • 4Krawczyk H.HMQV:A High-performance Secure Diffie-Hellman Protocol[C]//Proc.of CRYPTO'05.Berlin,Germany:Springer-Verlag,2005:546-566.
  • 5Lauter K,Mityagin A.Security Analysis of KEA Authenticated Key Exchange Protocol[C]//Proc.of PKC'06.Berlin,Germany:Springer-Verlag,2006:378-394.
  • 6Lamacchia B A,Lauter K,Mityagin A.Stronger Security of Authenticated Key Exchange[C]//Proc.of ProvSec'07.Berlin,Germany:Springer-Verlag,2007:1-16.
  • 7Cheng Qingfeng,Ma Chuangui.A New Strongly Secure Authenticated Key Exchange Protocol[C]//Proc.of ISA'09.Berlin,Germany:Springer-Verlag,2009:135-144.
  • 8赵建杰,谷大武.eCK模型下可证明安全的双方认证密钥协商协议[J].计算机学报,2011,34(1):47-54. 被引量:15
  • 9Zheng Yuliang,Imai H.Compact and Unforgeable Key Establishment over an ATM Network[C]//Proc.of INFOCOM'98.San Francisco,USA:IEEE Press,1998:411-418.
  • 10刘文浩,许春香.强安全两方认证密钥协商方案[J].计算机应用研究,2011,28(3):1133-1135. 被引量:2

二级参考文献34

  • 1张串绒,肖国镇.基于签密技术的可认证密钥协商协议[J].空军工程大学学报(自然科学版),2006,7(6):65-67. 被引量:4
  • 2Bellare M, Rogaway P. Entity authentication and key distribution//Stinson D R. Crypto'93. Lecture Notes in Computer Science 773. Berlin: Springer, 1993: 232-249.
  • 3Shoup V, Rubin A. Session key distribution using smart eards//Maurer U. Eurocrypt'96. Lecture Notes in Computer Science 1070. Berlin: Springer, 1996:321-331.
  • 4Wilson S B, Menezes A. Authenticated Diffie Hellman key agreement protocols//Tavares S, Meijer H. SAC'99. Lecture Notes in Computer Science 1556. Berlin: Springer, 1999:339-361.
  • 5Wilson S B, Johnson D, Menezes A. Key exchange protocols and their security analysis//Darnell M. Proceedings of the 6th IMA International Conference on Cryptography and Cod ing. Lecture Notes in Computer Science 1355. Berlin: Springer, 1997:30-45.
  • 6Canetti R,Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels//Pfitzmann B. Eurocrypt2001. Lecture Notes in Computer Science 2045. Berlin: Springer, 2001:451-472.
  • 7LaMacchia B,Lauter K, Mityagin A. Stronger security of authenticated key exchange//Susil0 W, l.iu J K, Mu Y. ProvSec 2007. Lecture Notes in Computer Science 4784. Berlin: Springer, 2007:1-16.
  • 8Xia J, Wang J, Fang L, Ren Y, Bian S. Formal proof of relative strength of security among ECK2007 model and other proof models for key agreement protocols. Transactions of Nanjing University of Aeronautics & Astronautics, 2008, 25 (4) : 282-288.
  • 9Lauter K, Mityagin A. Security analysis of KEA authenticated key exchange protocol//Yung M, PKC2006. Lecture Notes in Computer Science 3958. Berlin: Springer, 2006: 378-394.
  • 10Krawczyk H. HMQV: A high-performance secure Diffie-Hellman protocol//Shoup V. Crypto2005. Lecture Notes in Computer Science 3621. Berlin: Springer, 2005:546-566.

共引文献17

同被引文献20

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部