摘要
无证书公钥密码体制具有很好的特性,它不需要使用证书,也不存在用户私钥托管问题。该文提出一个基于双线性对的无证书两方认证密钥协商协议,使用数字签名方案实现协议中的身份认证;对数字签名方案的安全性进行了证明,表明该签名方案能够抵抗适应性选择消息攻击下的存在性伪造;对密钥协商协议的安全性进行了分析,结果表明协议具备已知密钥安全、抗未知密钥共享攻击、完美前向安全、密钥俘获伪装攻击和抗临时私钥泄露攻击等安全属性。与其他具备相同安全属性的协议相比,该协议使用的双线性对运算的个数少得多,并且不使用模幂运算,因此计算量要小得多。
Certificateless public key cryptography has appealing features, namely it does not require the use of certificates and does not have a private key escrow feature. This paper describes a certificateless key agreement protocol based on bilinear pairings. The identity authentication in the protocol depends on a digital signature scheme. This paper proves the security of the signature scheme. The results show that in the random oracle model with the discrete logarithm assumption, the signature scheme resists existential forgeries against adaptive chosen message attacks. The results farther show that the protocol preserves the desired security properties, including known-key security, unknown key-share resilience, perfect forward secrecy, key-compromise impersonation resilience and leakage of ephemeral private key resilience. The protocol requires much lower computation overhead than related protocols, since it uses fewer bilinear pairing operations and no modular exponentiation.
出处
《清华大学学报(自然科学版)》
EI
CAS
CSCD
北大核心
2012年第9期1293-1297,共5页
Journal of Tsinghua University(Science and Technology)
基金
国家核高基重大专项项目(2010ZX01045-001-005-4)
国家"八六三"高技术项目(2011AA01A203)
关键词
密钥协商
无证书公钥密码体制
数字签名
双线性对
key agreement
certificateless public key cryptography
data signature
bilinear pairing