期刊文献+

一种安全高效的无证书可认证密钥协商方案 被引量:1

A Secure and Efficient Certificateless Authenticated Key Agreement Scheme
下载PDF
导出
摘要 针对两方密钥协商方案普遍存在高效性和安全性不可兼顾问题,在无证书公钥密码体制下给出一种安全高效的可认证两方密钥协商方案。该方案使用一般的而非映射到点的Hash函数并预先处理一个双线性对运算,降低计算复杂度,提高了执行效率;增加用户间的身份认证,提高了安全性。性能分析表明,新方案满足前向安全性;抗密钥泄露伪装攻击;已知会话临时秘密信息安全性等目前期望的安全属性,且有较好的执行效率。 It is a matter of fact that high efficiency and security of the two-party key agreement can ' t be done at the same time, a secure and efficient certifieateless authenticated two-party key agreement scheme is proposed based on certifieateless public key cryptography system. In this system, it handles a bilinear pairing operation beforehand and uses an ordinary Hash function rather than mapping to point. The scheme can reduce the computational complexity and is of greater efficiency of execution. With the addition of a user identification, the two-party key agreement scheme is slightly safer. The performance analysis shows this scheme can fulfil the expected security of the forward secrecy, key compromise impersonation attack and known session-specific temporary information secrecy. Meanwhile it keeps the high computational efficiency.
作者 马俊 王晓峰
出处 《计算机与现代化》 2014年第3期161-164,共4页 Computer and Modernization
基金 国家自然科学基金资助项目(61075007) 陕西省教育厅科学研究项目(11JK0900) 陕西工业职业技术学院科研项目(ZK12-25)
关键词 无证书密码体制 认证 双线性对 Diffie—Hellman 前向安全 certifieateless cryptography system authentication hilinear pairing Diffie-Hellman forward secrecy
  • 相关文献

参考文献5

二级参考文献28

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2A1-Riyami S S, Paterson K G.Certificateless public key cryptography[C]//PPLNCS 2894: Advance in Cryptography Asiacrypt 2003.Berlin: Springer, 2003 : 452-473.
  • 3Zhang Z, Duncan S, Wong J, et al.Certificateless public-key signature: Security model and efficient construction[C]//PPLNCS 3989: Advance in Applied Cryptography and Network Security 2006.Berlin : Springer, 2006:293-308.
  • 4Huang Xinyi,Mu Yi, Susilo W, et al.Certificateless signature revisited[C]//PPLNCS 4586:Proc of Aeisp 2007.Berlin:Springer, 2007: 308-322.
  • 5Zhang Guoyan, Wang Shaohui.A certificateless signatureand group signature schemes against malicious PKG[C]//Proceedings of the 22nd IEEE Int Conf on Advanced Information Networking and Applications.Ginwan,Okinawa,Japan:A1NA,2008.
  • 6Hu B, Wong D,Zhang Z, et aLKey replacement attack against a generic construction of certificateless signature[C]//Proceedings of the ACISP 2006,Melbourne,Australia,2006:235-346.
  • 7Zhang L, Zhang F T, Zhang F G.New efficient certificateless signature scheme[C]//Proceedings of the EUC Workshops 2007, Taipei, China, 2007 : 692-703.
  • 8Cheng Z H,Comley R.Efficient Certificateless Public Key Encryption. http://eprint.iacr.org/ 2005/012.pdf . 2005
  • 9Barua R,Dutta R,Sarkar P.Extending Joux’s Protocol to Multi Party Key Agreement. http: //eprint.iacr.org/2003/062.pdf . 2003
  • 10Cheng Z H,,Comley R,Vasiu L.Remove Key Escrow from the Identity-Based Encryption System[].Foundations of Information Technology in the Era of Network and Mobile Computing.2004

共引文献60

同被引文献12

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部