期刊文献+

基于签名方案的多密钥协商协议 被引量:1

Multi-key agreement protocol based on signature scheme
下载PDF
导出
摘要 多密钥协商协议可以在一次会话中协商出多个会话密钥,大大降低了密钥协商的成本,因此受到研究者们的关注。提出了一种新的基于签名的多密钥协商协议,新协议利用传统的签名方案实现参与者之间信息的隐藏,并通过引入Hash函数来加强协议的安全性。对新协议的安全性和计算量进行了讨论,结果表明,新协议在减少计算量的前提下实现了协议双方的安全密钥协商。 Multi-key agreement protocol can generate multi-keys in one session,so researchers are interested in it these days.In this paper,a new multi-key agreement protocol based on the traditional signature scheme was proposed.The new scheme realizes the hiding of the information between the participants and enhanced the security of our protocol by using Hash function.This paper discussed the security and computational cost of the new scheme.The result shows that the new protocol realizes the secure key agreement with lower computational cost.
作者 邓飞 贺军
出处 《计算机应用》 CSCD 北大核心 2012年第12期3456-3457,3461,共3页 journal of Computer Applications
关键词 密码学 认证 多密钥协商 签名方案 已知密钥安全 cryptography authentication multi-key agreement signature scheme known-key security
  • 相关文献

参考文献12

  • 1DIFFIE W, HELLMAN M. New directions in cryptography[ J]. IEEE Transactions on Information Theory, 1976, 22(6): 644 - 654.
  • 2MENEZES A, QU M, VANSTONE S. Some new key agreement pro- tocols providing implicit authentication[ C]// Conference on Selected Areas in Cryptography 1995. Piscataway: IEEE, 1995:22-32.
  • 3ANSI X9.42. Agreement of symmetric algorithm keys using Diffie- Hellman[ S]. IETF, 1998.
  • 4ANSI X 9.63. Elliptic curve key agreement and key transport proto- cols[S]. Piscataway: IEEE, 1998.
  • 5IEEE P1363. Standards specifications for public-key cryptosystems IS]. Piscataway: IEEE 1998.
  • 6HARN L, LIN H Y. An authenticated key agreement protocol with- out using one-way function[ C]//Proceedings of the 8th Information Security Conference. Piscataway: IEEE, 1998t 155-160.
  • 7YEN S M, JOYE M. Improved authenticated multiple-key agree- ment protocol[J]. Electronics Letters, 1998, 34(18) : 1738 - 1739.
  • 8WU T S, HE W H, HSU C L. Security of authenticated multiple- key[ J]. Electronics Letters, 1999, 35(5) : 391 - 392.
  • 9HARN L , LIN H Y . Authenticated key agreement without using one-way Hash function[J]. Electronics Letters, 2001,37(10):629 - 630.
  • 10ZHOU H S, FAN L, LI J H. Remarks on unknown key-share at- tack on authenticated multiple-key agreement protocol[ J]. Elec- tronics Letters, 2003, 39(17) : 1248 - 1249.

同被引文献33

  • 1AKYILDIZ F, WANG Xu-dong, WANG Wei-lin. Wireless mesh net- works: a survey[J]. Computer Networks,2005,47(4) :445-487.
  • 2HU Zhi-yuan, DENG Jian-liang, CHANG Ying-hua,et aL Design and analysis of reliability wireless mesh network [ C ]//Proc of Internatio- nal Conference on Computer Science and Service System. 2011:3128- 3131.
  • 3ALRAYES M, TRIPATHI R, TYAGI N, et al. Enhancement of route maintenance in AODV over hybrid wireless mesh network [ C ]//Prec of the 1 st International Conference on Recent Advances in Information Technology. 2012:276-278.
  • 4LIU Shu-xin, PENG Jian-hua, LIU Cai-xia. Analysis of wireless mesh network security based on node functio'n[ C]//Proc of the 7th Interna- tional Conference on Computational Intelligence and Security. 2011 : 648-652.
  • 5KHAN S, ALRAJEH N A, LOOK K. Secure route selection in wireless mesh networks [ J]. Computer Nelworks,2012,56(2):491-503.
  • 6DONG Jing, CURTMOLAB R, NITA-ROTARU C. Secure network coding for wireless mesh networks : threats, challenges, and direc- tions [ J]. Computer Communications ,2009,32 ( 17 ) : 1790-1801.
  • 7AI ISLAM A, RAGHUNATHAN V. End-to-end congestion control in wireless mesh networks using a neural network [ C ]//Pioc of IEEE Wireless Communications and Networking Conference. 2011:677-682.
  • 8VURAL S,WEI D L, MOESSNER K. Survey of experimental evalua- tion studies for wireless mesh network deployments in urban areas to- wards ubiquitous Internet [ J]. IEEE Communications Surveys & Tutorials ,2013,1 5( 1 ) :223-239.
  • 9REDDY K, NALLA D. Identity based authenticated group key agree- ment protocol[ C ]//Progress in Cryptology. 2002:215-233.
  • 10BRESSON E, CHEVASSUT O, PO1NTCHEVAL D. Provably-secure authenticated group Diffie-Hellman key exchange [ J ]. ACM Trans on information and System Security,2007,10 (3) : 1-44.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部