期刊文献+

一种新的适于Ad hoc网可认证密钥协商协议

New authenticated key agreement protocol for Ad hoc networks
下载PDF
导出
摘要 提出一种新的适于Ad hoc网可认证密钥协商协议。基于签密技术,在同一逻辑步内同时实现了认证和加密功能,提高了密钥协商效率;基于身份的公钥密码系统,降低了建立和管理公钥基础设施的代价;应用椭圆曲线上双线性对,使得该协议能以短的密钥和小的计算量实现同等安全要求。与已有密钥协商协议相比,新协议计算和传输量小,带宽要求低,安全性高,适合能源和带宽受限的Ad hoc网络。 A new authenticated key agreement protocol for Ad hoc networks is proposed. Based on Signcryption technique, this protocol achieves the two functions of authentication and encryption in a single logical step and therefore it has high efficiency. Moreover, using ID-based public key system, the expense of building and managing public key infrastructure is decreased. In addition, the proposed protocol employing bilinear pairing on elliptic curve can reach the equivalent levels of security with key of short length and less computation. Compared with other existent authenticated key agreement protocols, it has a small amount of calculation and transmission, narrow bandwidth requirement, and is high security level. It is very fit for wireless Ad hoc networks.
作者 马俊 张绪绪
出处 《电子设计工程》 2013年第22期66-68,共3页 Electronic Design Engineering
基金 陕西工业职业技术学院科研项目(ZK12-25)
关键词 Ad HOC网络 密钥协商 签密 基于身份的公钥系统 双线性对 Ad hoc networks key agreement protocol signcryption ID-based public key system bilinear pairing
  • 相关文献

参考文献2

二级参考文献24

  • 1Blake-wilson S,Johnson D,Menezes A.Key agreement protocols and their security analysis[C]//LNCS 1355:Proc of the 6th IMA International Conference on Cryptography and Coding.Berlin:SpringerVerlag, 1997: 30-45.
  • 2Shamir A.Identity-based cryptosystems and signature schemes[C]// LNCS 196:Proc of Advances in Cryptology-Crypto 1984.Berlin: Springer-Verlag, 1984: 47-53.
  • 3Shim K.Efficient ID-based authenticated key agreement protocol based on the Weil pairing[J].IEE Electronics Letters,2003, 39(8): 653-654.
  • 4Sun H,Hsieh B.Security analysis of Shim's authenticated key agreement protocols from pairings[EB/OL].http://eprint.iacr.org/2003/113.
  • 5Mccullagh N,Barreto P.A new two party identity-based authenticated key agreement[C]//LNCS 3376:Proc of the 2005 RSA Conference. Berlin: Springer-Verlag, 2005 : 262-274.
  • 6Xie G H.Cryptanalysis of the Noel McCullagh and Paulo S.L.M. Barreto's two party identity-based key agreement[EB/OL].http:// eprint.iacr.org/2004/343.
  • 7Chen L, Kudla C.Identity based authenticated key agreement protocols from pairing[C]//Proc of the 16th IEEE Computer Security Foundations Workshop.Pacific, New York:IEEE Computer Society, 2003:219-213.
  • 8Bellare M,Rogaway P.Random oracles are practical:a paradigm for designing efficient protocols[C]//Proc of the First AcM Conference on Computer and Communication Security.New York:ACM Press, 1993 : 62-73.
  • 9Gentry C.Practical identity-based encryption without random ora- cles [C]//LNCS 4004:Proc of Advances in Cryptology Eurocrypt 2006.Berlin: Springer-Verlag, 2006: 445-464.
  • 10Canetti R,Krawczyk H.Analysis of key exchange protocols and their use for building secure channels[C]//LNCS 2045:Proc of Advances in Cryptology-Eurocrypt 2001.Berlin:Springer-Verlag,2001:453-474.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部