期刊文献+

独立网络中新的双方密钥协商协议 被引量:1

New two-party key agreement protocol in separate networks
下载PDF
导出
摘要 现有的密钥协商协议大多研究同一密钥生成中心(KGC)下的安全会话,即参与者的参数都由同一KGC提供。为了实现处于不同KGC中的参与者的安全会话,采用椭圆曲线设计方案提出了一种新的基于身份的双方认证密钥协商协议,新协议实现了两个具有独立参数的KGC中参与者的安全密钥协商。还利用改进的Blake-Wilson模型对新协议的安全性进行了严格的形式化证明。通过分析表明该新协议不但具有足够的安全性,而且还具备计算量小、效率高的特点,因而,可用于对能耗要求高的轻量级设备中。 There is much research about key agreement focus on the secure communication in the same Key Generation Center (KGC), i.e. all the parameters of different participants should be provided by one KGC. To realize the secure communication between two users in different KGCs, adopting elliptic curve cryptography algorithm, a new two-party ID-based key agreement protocol was proposed. This new scheme realized key agreement protocol in separate networks between two participants. Then the improved Blake-Wilson model was used to prove the security of the scheme. After being analyzed, the new protocol was proved to be secure, efficient and of lower computational cost. Therefore, the new scheme will be compatible with low-power and lightweight devices.
出处 《计算机应用》 CSCD 北大核心 2013年第5期1353-1356,共4页 journal of Computer Applications
基金 国家自然科学基金资助项目(61163038) 甘肃省自然科学基金资助项目(3ZS051-A25-042) 天水师范学院科研项目(TSE0810)
关键词 密钥协商 独立网络 椭圆曲线 密钥生成中心 可证明安全 key agreement separate network elliptic curve Key Generation Center (KGC) provable security
  • 相关文献

参考文献6

二级参考文献58

  • 1潘军华,李乃强,张星元.啤酒抗老化作用的研究进展[J].酿酒科技,2001(5):65-66. 被引量:2
  • 2Ruei-Chang Lu Yu-Pin Liao Department of Electronic Engineering, I-Lan Institute of Technology, 1, Shen-Nung Rd., ILan, 260,Taiwan, Tel: 886-03-9357400-653, Fax: 886-03-9369507, E-Mail: rclu@ilantech.edu.twDepartment of Electronic Engineering, Ching Yun Institute of Technology, 229, Chien-Hsin Rd., Jung-Li, Taoyuan,32020,Taiwan.The Novel Y-Branch With Two Reflectors[J].光学学报,2003,23(S1):297-298. 被引量:3
  • 3Minghua Wang, Jianyi Yang, Xiaoqing Jiang, Xihua Li (Dept. of Information & Electronics Engineering, Zhejiang University, Hangzhou 310027, China).Optical Waveguide Switches Employing Total-Internal-Reflection (TIR) Effect (Invited Paper)[J].光学学报,2003,23(S1):135-136. 被引量:3
  • 4Shamir A. Identity-based cryptosystems and signature schemes [C]. CRYPTO1984, California, 1984, LNCS196: 47-53.
  • 5Boneh D and Franklin M. Identity-based encryption from the Weil pairing [C]. CRYPTO2001, California, 2001, LNCS2139: 213-229.
  • 6Chen L, Cheng Z, and Smart N P. Identity-based key agreement protocols from pairings [J]. Int.J.Inf.Secur, 2(}07, 6(4): 213-241.
  • 7Smart N P. An identity-based authenticated key agreement protocol based on the Weil pairing [J]. Electronics Letters, 2002, 38(13): 650-632.
  • 8Choie Y, Jeong E, and Lee E. Efficient identity-based authenticated key agreement protocol from pairings [J]. Appl. Math. Comput., 2005, 162(1): 179-188.
  • 9McCullagh N and Barreto P S L M. A new two-party identity-based authenticated key agreement [C]. Topics in Cryptology-CT-RSA 2005, San Francisco, 2005, LNCS3376: 262-274.
  • 10Zhu R W, Yang G, and Wong D S. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices [J]. Theoretical Computer Science, 2007, 378(2): 198-207.

共引文献24

同被引文献33

  • 1AKYILDIZ F, WANG Xu-dong, WANG Wei-lin. Wireless mesh net- works: a survey[J]. Computer Networks,2005,47(4) :445-487.
  • 2HU Zhi-yuan, DENG Jian-liang, CHANG Ying-hua,et aL Design and analysis of reliability wireless mesh network [ C ]//Proc of Internatio- nal Conference on Computer Science and Service System. 2011:3128- 3131.
  • 3ALRAYES M, TRIPATHI R, TYAGI N, et al. Enhancement of route maintenance in AODV over hybrid wireless mesh network [ C ]//Prec of the 1 st International Conference on Recent Advances in Information Technology. 2012:276-278.
  • 4LIU Shu-xin, PENG Jian-hua, LIU Cai-xia. Analysis of wireless mesh network security based on node functio'n[ C]//Proc of the 7th Interna- tional Conference on Computational Intelligence and Security. 2011 : 648-652.
  • 5KHAN S, ALRAJEH N A, LOOK K. Secure route selection in wireless mesh networks [ J]. Computer Nelworks,2012,56(2):491-503.
  • 6DONG Jing, CURTMOLAB R, NITA-ROTARU C. Secure network coding for wireless mesh networks : threats, challenges, and direc- tions [ J]. Computer Communications ,2009,32 ( 17 ) : 1790-1801.
  • 7AI ISLAM A, RAGHUNATHAN V. End-to-end congestion control in wireless mesh networks using a neural network [ C ]//Pioc of IEEE Wireless Communications and Networking Conference. 2011:677-682.
  • 8VURAL S,WEI D L, MOESSNER K. Survey of experimental evalua- tion studies for wireless mesh network deployments in urban areas to- wards ubiquitous Internet [ J]. IEEE Communications Surveys & Tutorials ,2013,1 5( 1 ) :223-239.
  • 9REDDY K, NALLA D. Identity based authenticated group key agree- ment protocol[ C ]//Progress in Cryptology. 2002:215-233.
  • 10BRESSON E, CHEVASSUT O, PO1NTCHEVAL D. Provably-secure authenticated group Diffie-Hellman key exchange [ J ]. ACM Trans on information and System Security,2007,10 (3) : 1-44.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部