期刊文献+

无证书可认证三方密钥协商协议 被引量:2

Certificateless authenticated tripartite key agreement protocol
下载PDF
导出
摘要 为了抵抗主动攻击,2010年陈家琪等人提出了一个可认证的无证书三方密钥协商协议,但该密钥协议不能抵抗被动敌手的攻击,也不能满足他文章中所陈述的一些安全属性。为了解决上述问题,在He De-biao等人的无证书两方密钥协商协议基础上,提出了一个新的无证书可认证三方密钥协商协议。对新协议进行了安全性分析和效率分析,结果表明,新协议满足无证书可认证三方密钥协商协议的安全要求。与陈家琪的协议相比,新协议中的双线性对的个数减少了,因而新协议的计算效率更高。 In order to resist against the active attacks,Chen Jia-qi proposed an authenticated tripartite key agreement protocol based on certificateless cryptography in 2010. However,the protocol couldn't resist the passive opponent's attack,and it also couldn't meet some security attributes stated by Chen Jia-qi. In order to solve the above problems,based on an efficient certificateless two-party authenticated key agreement protocol given by He De-biao,this paper proposed a new certificateless authenticated tripartite key agreement protocol. The security and efficiency of the new protocol were analyzed. The result shows that the new protocol satisfies the security properties of the certificateless authenticated tripartite key agreement protocol. Compared with the protocol proposed by Chen Jia-qi,the efficiency of the new protocol is higher,which attributes to the reduced number of pairings in the new protocol.
出处 《计算机应用研究》 CSCD 北大核心 2014年第7期2101-2104,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60773035) 四川省教育厅资助项目(13ZA0031) 西华大学重点实验室开放研究基金资助项目(S2jj2011-020) 西华大学数学与计算机学院杰出青年学者培育基金项目 西华大学校人才引进项目(R1222628)
关键词 无证书 可认证 密钥协商 双线性对 certificateless authenticated key agreement bilinear pairing
  • 相关文献

参考文献12

  • 1JOUX A. A one-round protocol for tripartite Diffie-Hellman [ C ]// Proc of the 4th International Algorithmic Number Theory Symposium. Berlin : Springer-Verlag, 2000 : 385- 394.
  • 2SHIM K. Efficient one-round tripartite authenticated key agreement protocol form the Weil pairing [ J ]. Electronics Letters, 2003,39 (2) :208-209.
  • 3LIU Sheng-li, ZHANG Fang-guo, CHEN Ke-fei. ID-based tripartite key agreement protocol with pairing[ C ]//Proc of IEEE International Symposium on Information Theory. Washington DC:IEEE Computer Society ,2003 : 136-143.
  • 4SHIM K, WOO S. Weakness in ID-based one round authenticated tri- partite multiple-key agreement protocol with pairings [ J ]. Applied Mathematics and Computation,2005,166 ( 3 ) :523- 530.
  • 5AL-RIYAMI S S, PATERSON K G. Certificateless public key cryp- tography [ C ]//Lecture Notes in Computer Science, vol 2894. Berlin : Springer-Vedag, 2003:452 - 473.
  • 6SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 7WANG Sheng-bao, CAO Zhen-fu, BAO Hai-yong. Efficient certifi- cateless authentication and key agreement (CL-AK) for grid compu- ting[ J]. International Journal of Network Security, 2008,7 ( 3 ) : 342- 347.
  • 8朱志馨,董晓蕾.高效安全的无证书密钥协商方案[J].计算机应用研究,2009,26(12):4787-4789. 被引量:10
  • 9舒剑.一种实用的无证书两方认证协议[J].小型微型计算机系统,2010,31(9):1889-1893. 被引量:11
  • 10LEE H, KIM D, KIM S, et al. Identity-based key agreement proto- cols in a multiple PKG environment [ C ]//Proc of International Con- ference on Computational Science and Its Applications. Berlin:Sprin- ger-Verlag ,2005 : 877- 886.

二级参考文献31

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4AL-RIYAMI S S, PATERSON K. Certificateless public key cryptography [ C ]// Proc of ASIACRYPT 2003. Berlin: Springer-Verlag, 2003:452-473.
  • 5LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange[ C ]//Proc of Sec 2007. Berlin: Springer-Verlag, 2007:1 - 16.
  • 6MANDT T K. Certificateless authenticated two-party key agreement protocols[ D ]. Oppland : Gjφvik University College, 2006.
  • 7BLAKE-WILSON S, JOHNSON D, MENEZES A. Key agreement protocols and their security analysis[ C ]//Proc of the 6th IMA International Conference on Cryptography and Coding. Berlin: Springer- Verlag, 1997: 30-45.
  • 8KUDLA C J. Special signature schemes and key agreement protocols [ D]. London: University of London, 2006.
  • 9DIFFIE W,HELLMAN M.New directions in Cryptography[J].IEEE Trans on Information Theory,1976,22(6):644-654.
  • 10JOUX A.A One-round protocol for tripartite Diffie-Hellman[C]// Proc of Algorithmic Number Theory Symposium.[S.l.]:Springer-Verlag,2000.

共引文献42

同被引文献19

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部