期刊文献+

改进的双方密钥协商协议 被引量:1

Improved two-party authenticated key agreement protocol
下载PDF
导出
摘要 双方认证密钥协商是生成会话密钥的重要手段。分析了赵建杰等于2011年提出的一个可证明安全的双方认证密钥协商协议,指出如果敌手持有原协议的长期私钥,协议是不安全的。提出一种改进的协议,新协议将影响安全性的公开参数保护起来,避免了长期私钥的泄露,并对新协议的安全性和计算量进行了讨论。分析结果表明,新协议在减少计算量的前提下实现了协议双方的安全密钥协商。 Two-party authenticated key agreement is one of the methods to generate session keys.In this paper,the authors analyzed a new provably secure two-party authenticated key agreement protocol proposed in 2011 by Jianjie Zhao et al.and pointed out that this protocol was not secure if the adversary can obtain the long-term key of a participant.Then an improved protocol was presented,and in the new scheme,the parameters that may leak the long-term keys were encrypted.The authors also discussed the security and computational cost of the new scheme.The result shows that the new protocol realizes the secure key agreement with lower computational cost.
作者 张龙翔
出处 《计算机应用》 CSCD 北大核心 2012年第11期3147-3148,3152,共3页 journal of Computer Applications
关键词 密码学 认证 密钥协商 前向安全性 可证明安全 cryptography authentication key agreement forward secrecy provable security
  • 相关文献

参考文献12

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography[ J]. IEEE Transactions on Information Theory, 1976, 22(6) : 644 - 654.
  • 2MATSUMOTO T, TAKASHIMA Y, IMAI H. On seeking smart public-key distribution systems[ J]. Transactions on IECE, 1956, 69(2) : 99 - 106.
  • 3MENEZES A, QU M, VANSTONE S. Some new key agreement protocols providing mutual implicit authentication [ C]// SAC'95: Proceedings of the Second Workshop on Selected Areas in Cryptography. New York: ACM, 1995 : 22 - 32.
  • 4LAW L, MENEZES A, QU M, et al. An efficient protocol for authenticated key agreement[ J]. Designs, Codes and Cryptography, 2003, 28(2) : 119 - 134.
  • 5KRAWCZYK H. HMQV: A high-performance secure Diffie-Hellman protocol [ C]//CRYPTO 2005: Proceedings of the 25th International Cryptology Conference, LNCS 3621. Berlin: Springer-Verlag, 2005:546-566.
  • 6赵建杰,谷大武.eCK模型下可证明安全的双方认证密钥协商协议[J].计算机学报,2011,34(1):47-54. 被引量:15
  • 7LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange [ C]// Proceedings of the 1st International Conference on Provable Security. Berlin: Springer-Verlag, 2007:1 - 16.
  • 8LAUTER K, MITYAGIN A. Security analysis of KEA authenticated key exchange protocol[ C]// Public Key Cryptography 2006, LNCS 3958. Berlin: Springer, 2006:378 -39.
  • 9杨小东,王彩芬.前向安全的单向门限代理重签名[J].计算机应用,2011,31(3):801-804. 被引量:3
  • 10高海英.高效的基于身份的认证密钥协商协议[J].计算机应用,2012,32(1):35-37. 被引量:4

二级参考文献56

  • 1Blake-wilson S,Johnson D,Menezes A.Key agreement protocols and their security analysis[C]//LNCS 1355:Proc of the 6th IMA International Conference on Cryptography and Coding.Berlin:SpringerVerlag, 1997: 30-45.
  • 2Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196:Proc of Advances in Cryptology-Crypto 1984.Berlin: Springer-Verlag, 1984: 47-53.
  • 3Shim K.Efficient ID-based authenticated key agreement protocol based on the Weil pairing[J].IEE Electronics Letters,2003, 39(8): 653-654.
  • 4Sun H,Hsieh B.Security analysis of Shim's authenticated key agreement protocols from pairings[EB/OL].http://eprint.iacr.org/2003/113.
  • 5Mccullagh N,Barreto P.A new two party identity-based authenticated key agreement[C]//LNCS 3376:Proc of the 2005 RSA Conference. Berlin: Springer-Verlag, 2005 : 262-274.
  • 6Xie G H.Cryptanalysis of the Noel McCullagh and Paulo S.L.M. Barreto's two party identity-based key agreement[EB/OL].http:// eprint.iacr.org/2004/343.
  • 7Chen L, Kudla C.Identity based authenticated key agreement protocols from pairing[C]//Proc of the 16th IEEE Computer Security Foundations Workshop.Pacific, New York:IEEE Computer Society, 2003:219-213.
  • 8Bellare M,Rogaway P.Random oracles are practical:a paradigm for designing efficient protocols[C]//Proc of the First AcM Conference on Computer and Communication Security.New York:ACM Press, 1993 : 62-73.
  • 9Gentry C.Practical identity-based encryption without random ora- cles [C]//LNCS 4004:Proc of Advances in Cryptology Eurocrypt 2006.Berlin: Springer-Verlag, 2006: 445-464.
  • 10Canetti R,Krawczyk H.Analysis of key exchange protocols and their use for building secure channels[C]//LNCS 2045:Proc of Advances in Cryptology-Eurocrypt 2001.Berlin:Springer-Verlag,2001:453-474.

共引文献21

同被引文献8

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部