期刊文献+

非平衡网络环境下基于身份的组密钥交换协议 被引量:1

Identity-based group key exchange protocol for unbalanced network environment
下载PDF
导出
摘要 针对参与者计算能力不均衡的非平衡无线网络环境,首先对基于身份的群组认证密钥协商(ID-AGKA)协议进行安全性分析,指出该协议不能抵抗临时密钥泄露攻击;随后通过对该协议签名的生成方式进行改进,使得改进的协议不仅在安全性上有所提高,而且能有效减少计算代价和通信代价,因此更适用于非平衡无线网络;同时,协议采用了指定验证者签名,能有效地解决签名者的隐私问题;此外,对非平衡网络中群组密钥协商协议的动态机制进行改进,通过高能量节点合理利用用户动态变化前计算的信息来减少低能量节点不必要的计算,这一改进能极大减少低能量节点的计算代价,更符合实际需求;最后,在随机预言模型中基于整除判定性Diffie-Hellman(DDDH)假设证明了改进的群组密钥协商(GKA)协议的安全性。 In consideration of the unbalanced wireless network whose participants have unbalanced computing power, the article analyed the security of the IDentity-based Authenticated Group Key Agreement( ID-AGKA) protocol, and pointed out that the protocol could not resist the ephemeral key leakage attack. Then because the generation of the agreement signature was improved, the safety was improved, the computational cost and communication cost was reduced effectively, so the improved protocol was more suitable for the unbalanced wireless network. Meanwhile, the protocol used a designated verifier signature,which could effectively solve the privacy problem of the signer. Moreover, in this article, the dynamic mechanism of unbalanced network group key agreement protocol was improved by powerful node making full use of the low-power nodescomputation information before users join or leave. This improvement could greatly reduce the unnecessary computation of the low-power nodes, making the new protocol more conform the actual needs. Finally, the safety of the improved Group Key Agreement( GKA) protocol was proved based on Divisible Decisional Diffie-Hellman( DDDH) assumption in the random oracle model.
出处 《计算机应用》 CSCD 北大核心 2015年第5期1399-1405,共7页 journal of Computer Applications
基金 国家自然科学基金资助项目(61379150 61309016) 河南省自然科学基金资助项目(122102210426) 信息保障技术重点实验室开放课题(KJ-13-02) "十二五"密码发展基金资助项目(MMJJ201201005)
关键词 非平衡无线网络 群组密钥协商 临时密钥泄露攻击 指定验证者签名 动态机制 随机预言模型 unbalanced wireless network group key agreement ephemeral key leakage attack designated verifier signature dynamic mechanism random oracle model
  • 相关文献

参考文献19

  • 1BOYD C, NIETO J M G. Round-optimal contributory conference key agreement[ M]. Berlin: Springer, 2002: 161-174.
  • 2BRESSON E, CHEVASSUT O, ESSIARI A, et al. Mutual authen- tication and group key agreement for low-power mobile devices[ J]. Computer Communications, 2004, 27(17) : 1730 - 1737.
  • 3NAM J, LEE J, KIM S, et al. DDH-based group key agreement in a mobile environment[ J]. Journal of Systems and Software, 2005, 78(1): 73-83.
  • 4KATZ J, YUNG M. Scalable protocols for authenticated group key exchange[ C]// Proceedings of CRYPTO 2003. Bedim Springer, 2003: 110-125.
  • 5NAM J, KIM S, WON D. Attacks on Bresson-Chevassut-Essiari- Pointcheval's group key agreement scheme for low-power mobile de- vices[ J/OL]. [ 2014 -06 -20]. http://wenku, baidu, eom/link?ud = crcZQsRk7tFAf65ikB2E31RevPvw_IdizJjgwQAmAS]2rE90axbUrR uywy9 YwoASkgHh94 aa463 NL-5 sK9KV5 q-Iu9Xhl vr8E3s5 mZ_.INTG.
  • 6TSENG Y M. On the security of two group key agreement protocols for mobile devices[ C]// Proceedings of the 7th International Confer- ence on Future Mobile and Ubiquitous Information Technologies. Piscataway: IEEE, 2006: 97.
  • 7TSENG Y M. A resourc. for imbalanced wireless 2007, 26(4): 331-337.
  • 8group key agreement protocol networks [ J]. Computers and Security, LEE C C, LINT H, TSAI C S. A new authenticated group key a- greement in a mobile environment[ J]. Annals of Telecommunica- tions, 2009, 64(11/12): 735-744.
  • 9TSAI J L. A novel authenticated group key agreement protocol for mobile environment[ J]. Annals of Telecommunications, 2011, 66 (11/12) : 663 -669.
  • 10CHENG Q, MA C, WEI F. Analysis and improvement of a new authenticated group key agreement in a mobile environment[ J]. Annals of Telecommunications, 2011, 66(5/6): 331-337.

二级参考文献12

  • 1Bresson E, Chevassut O, Essiari A, and Pointcheval D. Mutual authentication and group key agreement for low-power mobile devices [a]. Computer Communications, 2004, 27(17): 1730-1737.
  • 2Nam J, Lee J, Kim S, Won D. DDH-based group key agreement in a mobile environment [J]. The Journal of Systems and Software, 2005, 78(1): 73-83.
  • 3Tseng Y M. A resource-constrained group key agreement protocol for imbalanced wireless networks [J]. Computers and Security, 2007, 26(4): 331-337.
  • 4Lee C C, Lin T H, and Tsai C S. A new authenticated group key agreement in a mobile environment [J]. Annals of Telecommunications, 2009, 64(12): 735-744.
  • 5Herranz J and Villar J L. An unbalanced protocol for group key exchange [C]. Proceeding of TrustBus 2004, 2004, LNCS 3184: 172-180.
  • 6Cho S, Nam J, Kim S, and Won D. An efficient dynamic group key agreement for low-power mobile devices [C]. Proceeding of ICCSA 2005, LNCS 3480: 498-507.
  • 7Kim H, Nam J, Kim S, and Won D. Seucre and efficient ID-based group key agreement fitted for pay-TV [C]. Proceeding of PCM 2005, Part II, LNCS 3768: 117-128.
  • 8Tseng Y M. A secure authenticated group key agreement protocol for resource-limited mobile devices [J]. The Computer Journal, 2007, 50(1): 42-52.
  • 9Cho S, Song K, Cho D, and Won D. Secure mobile content delivery using dynamic group key agreement with batch verificaiton [C]. Proceeding of ICCSA 2007, Part II, LNCS 4706: 996-1007.
  • 10Lu C F, Wu T C, and Hsu C L. Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks [J]. Wseas Transactions on Communications, 2009, 8(11): 1145-1159.

同被引文献3

引证文献1

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部