期刊文献+

基于双线性对的无证书两方认证密钥协商协议 被引量:13

Certificateless two-party authenticated key agreement protocol based on bilinear pairings
原文传递
导出
摘要 无证书公钥密码体制具有很好的特性,它不需要使用证书,也不存在用户私钥托管问题。该文提出一个基于双线性对的无证书两方认证密钥协商协议,使用数字签名方案实现协议中的身份认证;对数字签名方案的安全性进行了证明,表明该签名方案能够抵抗适应性选择消息攻击下的存在性伪造;对密钥协商协议的安全性进行了分析,结果表明协议具备已知密钥安全、抗未知密钥共享攻击、完美前向安全、密钥俘获伪装攻击和抗临时私钥泄露攻击等安全属性。与其他具备相同安全属性的协议相比,该协议使用的双线性对运算的个数少得多,并且不使用模幂运算,因此计算量要小得多。 Certificateless public key cryptography has appealing features, namely it does not require the use of certificates and does not have a private key escrow feature. This paper describes a certificateless key agreement protocol based on bilinear pairings. The identity authentication in the protocol depends on a digital signature scheme. This paper proves the security of the signature scheme. The results show that in the random oracle model with the discrete logarithm assumption, the signature scheme resists existential forgeries against adaptive chosen message attacks. The results farther show that the protocol preserves the desired security properties, including known-key security, unknown key-share resilience, perfect forward secrecy, key-compromise impersonation resilience and leakage of ephemeral private key resilience. The protocol requires much lower computation overhead than related protocols, since it uses fewer bilinear pairing operations and no modular exponentiation.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第9期1293-1297,共5页 Journal of Tsinghua University(Science and Technology)
基金 国家核高基重大专项项目(2010ZX01045-001-005-4) 国家"八六三"高技术项目(2011AA01A203)
关键词 密钥协商 无证书公钥密码体制 数字签名 双线性对 key agreement certificateless public key cryptography data signature bilinear pairing
  • 相关文献

参考文献17

  • 1DiffieW, Van Oorschot P C, Wiener M J. Authentication and authenticated key exchanges [J]. Designs, Codes and Cryptography, 1992, 2(2): 107-125.
  • 2Adams C, Lloyd S. Understanding public-key infrastructure-concepts, standards, and deployment considerations [M]. Indiana, USA: Sarns, 1999.
  • 3Shamir A. Identity-based cryptosystems and signature schemes [C]//Proc 4th Annual International Cryptology Conference on Advances in Cryptology. New York, NY, USA: Springer-Verlag, 1984:47-53.
  • 4AI Riyami S S, Paterson K G. Certificateless public key cryptography [C]//Proc 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin, Germany: Springer-Verlag, 2003: 452- 473.
  • 5Dutta R, Barua R, Sarkar P. Pairing-based cryptographic protocols: a survey [R/OL]. (2004-06-24). http: //eprint. iacr. org/2004/064.
  • 6Joux A. A one round protocol {or tripartite Diffie-Hellman [C]//Proc 4th international symposium on algorithmic number theory. London, UK: Springer-Verlag, 2000: 385- 393.
  • 7Boneh D, Franklin M K. Identity based encryption from the Weii pairing [C]//Proc 21st Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 2001: 213- 229.
  • 8Mandt T K, Tan C H. Certificateless authenticated two-party key agreement protocols [C]//Proc 11th Annual Asian Computing Science Conference. Berlin, Germany: Springer-Verlag, 2006 :37 - 44.
  • 9Swanson C, Jao D. A study of two-party certificateless authenticated key-agreement protocols [C]//Proc 10th International Conference on Cryptology in India. Berlin, Germany: Springer-Verlag, 2009 : 57 - 71.
  • 10WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24

二级参考文献18

  • 1Cheng Z H,Comley R.Efficient Certificateless Public Key Encryption. http://eprint.iacr.org/ 2005/012.pdf . 2005
  • 2Barua R,Dutta R,Sarkar P.Extending Joux’s Protocol to Multi Party Key Agreement. http: //eprint.iacr.org/2003/062.pdf . 2003
  • 3Cheng Z H,,Comley R,Vasiu L.Remove Key Escrow from the Identity-Based Encryption System[].Foundations of Information Technology in the Era of Network and Mobile Computing.2004
  • 4Al-Riyami S S,,Paterson K G.Certificateless Public Key Cryptography[].Lecture Notes in Computer Science.2003
  • 5Yum D H,,Lee P J.Generic Construction of Certificateless Encryption[].Lecture Notes in Computer Science.2004
  • 6Al-Riyami S S,,Paterson K G.CBE from CL-PKE: A Generic Construction and Efficient Schemes[].Lecture Notes in Computer Science.2005
  • 7Chen L,Kudla C.Identity Based Authenticated Key Agreement from Pairings. http: //eprint.iacr.org/2002/184.pdf . 2002
  • 8Yum D H,Lee P J.Generic Construction of Certificateless Signature[].Lecture Notes in Computer Science.2004
  • 9Diffie W,Hellman M E.New Directions in Cryptography[].IEEE Transactions on Information Theory.1976
  • 10Blake-Wilson S,Menezes A.Authenticated Diffie-Hellman Key Agreement Protocols [ C][].Proc of SAC’.1999

共引文献30

同被引文献74

引证文献13

二级引证文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部