期刊文献+

基于层级化身份的可证明安全的认证密钥协商协议 被引量:6

Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity
下载PDF
导出
摘要 目前基于身份的认证密钥协商协议均以单个私钥生成器(PKG)为可信第三方,但这种系统结构难以满足身份分层注册与认证需求。该文以基于层级化身份的加密(HIBE)系统为基础重构了私钥的组成元素,并利用椭圆曲线乘法循环群上的双线性映射提出一个基于层级化身份的认证密钥协商协议,为隶属于不同层级的云实体提供了安全的会话密钥协商机制。基于CDH(Computational Diffie-Hellman)与GDH(Gap Diffie-Hellman)假设,该文证明了新协议在e CK模型下具有已知密钥安全性、前向安全性和PKG前向安全性,并且能够抵抗基于密钥泄露的伪装攻击。 At present most Identity-based authenticated key agreement protocols are built on the security infrastructure in which a single Private Key Generator (PKG) is contained as the only trusted third party of the whole system, however such kind of infrastructure can not satisfy the requirements of hierarchical identity register and authentication. On the basis of Hierarchical Identity Based Encryption (HIBE) system, this paper reconstructs the private key and proposes a new hierarchical identity based authenticated key agreement protocol using the bilinear map in multiplicative cyclic group and it provides secure session key exchange mechanism for cloud entities on different hierarchical levels. Based on the Computational Diffie-Hellman (CDH) and Gap Diffie-Hellman (GDH) assumptions, this paper proves that the new protocol not only achieves known-key security, forward secrecy and PKG forward secrecy, but also resists key-compromise impersonation attacks in the eCK model.
出处 《电子与信息学报》 EI CSCD 北大核心 2014年第12期2848-2854,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61003284 61121061) 北京市自然科学基金(4122053) 中央高校基本科研业务费专项资金(BUPT2013 RC0310) 新闻出版重大科技工程项目(GXTC-CZ-1015004/09 GXTC-CZ-1015004/15-1)资助课题
关键词 云计算 认证密钥协商协议 基于身份的密码体制 基于层级化身份的加密 eCK模型 Cloud computing Authenticated key agreement protocol Identity-Based Cryptography (IBC) Hierarchical Identity Based Encryption (HIBE) eCK Model
  • 相关文献

参考文献8

二级参考文献104

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 2田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 3DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Trans Info Theory, 1976, 22(6): 44-654.
  • 4SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology---Crypto'84[C], Berlin: Springer-Verlag, 1984.47-53.
  • 5OKAMOTO E. Proposal for identity-based key distribution system[J]. Electron Letters, 1986, 22: 1283-1284.
  • 6TANAKA K, OKAMOTO E. Key distribution system for mail systems using D-related information directory[J]. Computer Security, 1991, 10:5-33.
  • 7BONEH D, FRANKLIN M. Identity based encryption from the Weft pairing[A]. Advances in Cryptology---Crypto 2001[C]. Berlin: Springer- Verlag, 2001.213-229.
  • 8SMART N E An identity based authenticated key agreement rotocol based on the Weil pairing[J]. Electro Letters, 2002, 38:30-632.
  • 9XUN Y. Efficient ID-based key agreement from the Weil pairing[J]. IEE Electronics Letters, 2003, 39(2): 206-208.
  • 10SHIM K. Efficient ID-based authenticated key agreement protocol based on the Well pairing[J].IEE Electronics Letters,2003, 39(8): 653-654.

共引文献88

同被引文献40

  • 1BONEH D and FRANKLIN M. Identity-based encryption from the Weil pairing[C]. Proceedings of 21st Annual International Cryptology Conference, Santa Barbara,California, USA, 2001:213-229.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Proceedings of 4rd Annual International Cryptology Conference, Santa Barbara, California, USA, 1984: 47-53.
  • 3HORWITZ J and LYNN B. Toward hierarchical identity-based encryption[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Netherland, 2002: 466-481.
  • 4GENTRY C and SILVERBERG A. Hierarchical ID-based cryptography[C]. Proceedings of 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 548-566.
  • 5BONEH D, BOYEN X, and GOH E. Hierarchical identity based encryption with constant size ciphertext[C]. Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 440-456.
  • 6GUO H, MU Y, LI Z, et al. An efficient and nominteractive hierarchical key agreement protocol[J]. Computers : Security, 2011, 30(1): 28-34.
  • 7IBRIQ J and MAHGOUB I. HIKES: hierarchical key establishment scheme for wireless sensor networks[J]. International Journal of Communication Systems, 2014, 27(10): 1825-1856.
  • 8LIU W, LIU J, WU Q, et al. SAKE: scalable authenticated key exchange for mobile e-health networks[OL]. http://onlinelibrary.wiley.com/doi/10,1002/sec. 1198/abstrmc t. 2015.
  • 9KIMH. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS[J]. Sensors, 2014, 14(12): 23742-23757.
  • 10GOLDWASSER S and MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部