期刊文献+

可证明安全的基于身份的认证密钥协商协议 被引量:18

Provable Secure ID-Based Authenticated Key Agreement Protocol
下载PDF
导出
摘要 提出了一种具有私钥产生中心(private key generator,PKG)前向安全性的基于身份的认证密钥协商协议,协议中给出了一种利用用户双方的长期私钥和临时私钥联合计算共享密钥的方法.在标准模型下证明了协议的安全性,并且分析得出,即使攻击者能够同时获得双方的临时私钥或同时获得双方的长期私钥,共享密钥仍然是安全的.性能分析表明,该协议较好地平衡了计算复杂度和安全性这两个协议评价指标. Key agreement protocols are fundamental to establish communications between two or more parties over an insecure network. Authenticated key agreement protocols not only allow parties to compute the session key but also ensure the authenticity of the involved parties. The design of ID- based authenticated key agreement protocols, which are secure and efficient, remains an open question in the field of ID-based cryptography. In recent years, several ID-based two-party authenticated key agreement protocols have been proposed. However, we discover that these protocols are in fact insecure if the attacker has stronger ability of revealing the ephemeral private keys of parties. In this paper, a new ID-based two-party authenticated key agreement protocol is presented which possesses attribute of PKG forward security. In this protocol, the session key is calculated by the long-term private keys and ephemeral private keys of parties. It is provable secure under q-augmented bilinear Diffie-Hellman exponent (q-ABDHE) assumption in standard model. Analysis shows that the session key is also secure even if the attacker gets the long-term private keys or ephemeral private keys of parties. Compared with other protocols from security and performance, our protocol has a good balance between computational cost and security.
作者 高海英
出处 《计算机研究与发展》 EI CSCD 北大核心 2012年第8期1685-1689,共5页 Journal of Computer Research and Development
基金 国家"九七三"重点基础研究发展计划基金项目(2007CB311203)
关键词 基于身份的认证密钥协商协议 双线性对 标准模型 PKG前向安全性 临时私钥 长期私钥 ID-based authenticated key agreement protocol bilinear pairing standard model PKG- forward secrecy ephemeral private key long-term private key
  • 相关文献

参考文献15

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2Smart N. An identity based authenticated key agreement protocol based on the well pairing J. Electronics Letters, 2002, 38(13), 630-632.
  • 3Scott M. Authenticated ID-based key exchange and remote log in with insecure token and PIN numberEEB/OL]. (2002- 04-16) [2009-08-16]. http://Cryptology ePrint Archive 2002/ 164.
  • 4Shim K. Efficient II)-based authenticated key agreement protocol based on the Well pairing [J]. IEE Electronics Letters, 2003, 39(8): 653-654.
  • 5Chen L, Kudla C. Identity based authenticated key agreement from pairings I-C] //Proe of IEEE Computer Security Foundations Workshop. Piscataway, NJ: IEEE, 2003 219-233.
  • 6Yuan Q, Li S. A new efficient ID-based authenticated key agreement protocol [EB/OL]. (2005-08 29) [--2009-08-25]. http://Cryptology ePrint Archive 2005/309.
  • 7Sherman S, Chow M, Choo K R. Strongly-secure identity based key agreement and anonymous extension EEB/OL3. ( 2007-01-19 ) E 2009-08-25 1- http//Cryptology ePrint Archive 2007/018.
  • 8Huang Hai, Cao Zhenfu. An ID-based authenticated key exchange protocol based on Bilinear Diffie-Hellman problem [C] //Proc of the 4th Int Symp on Information, Computer, and Communications Security. New York ACM, 2009: 333-342.
  • 9Wang Y. Efficient identity based and authenticated key agreement protocol [-EB/OL. (2005-05-13) E2009 08-281. http://Cryptology ePrint Archive 2005[108.
  • 10Canetti R, Goldreieh O, Halevi S. The random oracle methodology, revisited [J. Journal of the ACM, 2004, 51 (4) : 557-594.

二级参考文献89

  • 1金立杰,许春香.基于身份的认证密钥协商协议[J].信息安全与通信保密,2007,29(8):20-22. 被引量:5
  • 2DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Trans Info Theory, 1976, 22(6): 44-654.
  • 3SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology---Crypto'84[C], Berlin: Springer-Verlag, 1984.47-53.
  • 4OKAMOTO E. Proposal for identity-based key distribution system[J]. Electron Letters, 1986, 22: 1283-1284.
  • 5TANAKA K, OKAMOTO E. Key distribution system for mail systems using D-related information directory[J]. Computer Security, 1991, 10:5-33.
  • 6BONEH D, FRANKLIN M. Identity based encryption from the Weft pairing[A]. Advances in Cryptology---Crypto 2001[C]. Berlin: Springer- Verlag, 2001.213-229.
  • 7SMART N E An identity based authenticated key agreement rotocol based on the Weil pairing[J]. Electro Letters, 2002, 38:30-632.
  • 8XUN Y. Efficient ID-based key agreement from the Weil pairing[J]. IEE Electronics Letters, 2003, 39(2): 206-208.
  • 9SHIM K. Efficient ID-based authenticated key agreement protocol based on the Well pairing[J].IEE Electronics Letters,2003, 39(8): 653-654.
  • 10SUN H, HSIEH B. Security analysis of Shim's authenticated key agreement protocols from pairings[EB/OL], http://eprint.iacr.org/2003/113.

共引文献67

同被引文献174

引证文献18

二级引证文献93

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部