期刊文献+

一个基于身份的密钥隔离认证密钥协商协议

ID-based key-insulated authenticated key agreement protocol
下载PDF
导出
摘要 鉴于目前已有的基于身份的认证密钥协商协议都未考虑后向安全性,结合密钥进化的思想,利用椭圆曲线加法群提出了一个基于身份的密钥隔离认证密钥协商协议。协议去除了双线性对运算,效率比基于双线性对构造的基于身份的协议有较大提高;协议不仅满足目前已知的所有针对认证密钥协商协议的安全性要求,而且还满足后向安全性。 In view of the absence of backward security in all existing identity-based(ID-based) authenticated key agreement protocols, this paper proposed an ID-based key-insulated key agreement protocol from additive elliptic curve group by incorpo- rating the idea of key evolution. Comparing with existing works, this protocol eliminated the pairing operation and thus outper- formed the pairing-based ID-based authenticated key agreement protocol. Furthermore, this protocol enjoys both of the known security requirements and the backward security. To the best of author' s knowledge, this is the first ID-based key-insulated au- thenticated key agreement protocol in the literature.
出处 《计算机应用研究》 CSCD 北大核心 2015年第3期885-886,908,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(61003230 61103206) 中央高校基本科研业务费专项资金资助项目(ZYGX2011J063)
关键词 基于身份的密码体制 认证的密钥协商 后向安全性 密钥隔离 identity-based cryptography authenticated key agreement backward security key-insulated
  • 相关文献

参考文献10

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography [ J ]. IEEE Trans on Information Theory,1976,22(6) :644-654.
  • 2XIONG Hu, CHEN Ya-nan, GUAN Zhi, et al. Finding and fixing vulnerabilities of several three-party password authenticated key exchange protocols without server public key [ J ]. Information Sciences,2013,235(20) :329-340.
  • 3XIONG Hu, CHEN Zhong, LI Fa-gen. New identity-based three-party authenticated key agreement protocol with provable security [ J ]. Journal of Network and Computer Applications, 2013,36 (2) : 927 -932.
  • 4HOLBL M, WELZER T, BRUMEN B. An improved two-party identity- based authenticated key agreement protocol using pairings [ J ]. Jour- nal of Computer and System Sciences,2012,29(10) :142-150.
  • 5SHAMIR A. Identity-based cryptosystems and signature schemes [ C]//Advances in Cryptology. 1985:47-53.
  • 6BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [ C ]//Advances in Cryptology. 2001 : 213-229.
  • 7CHEN L, CHENG Z, SMART N P. Identity-based key agreement pro- tocols from pairings [ J]. International Journal of Information Se- curity,2007,6(4) :213-241.
  • 8RAVI S, RAGHUNATHAN A, CHAKRADHAR S. Tamper resistance mechanisms for secure embedded systems [ C ]//Proc of the 17th In- ternational Conference on VLSI Design. 2004:605-611.
  • 9FRANKLIN M. A survey of key evolving cryptosystems [ J]. Interna- tional Journal of Security and Networks,2006,1 (1/2) :46-53.
  • 10DODIS Y, KATZ J, XU Shou-huai, et al. Key-insulated public-key cryptosystems [ C]//Proc of EUROCRYPT. 2002:65-82.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部