期刊文献+

前向安全的无配对运算认证密钥协商协议 被引量:1

Pairing-free ID-based authenticated key agreement protocol for satellite networks with forward security
下载PDF
导出
摘要 针对卫星通信网络节点安全性要求高、卫星计算资源受限等问题,提出了一种前向安全的无配对运算认证密钥协商协议。通过对现有的仅能保证会话发起方前向安全性的密钥协商协议进行改进,保证了通信双方在会话过程中的前向安全性;用轻量级的椭圆曲线离散对数运算(elliptic curve discrete logarithm,ECDL)代替双线性对运算,节省了协议计算开销;采用计算开销转移的思想,将身份认证的计算开销转移至飞行器端,相对减轻了卫星计算负担。与现有认证密钥协商协议相比,新协议计算开销较低。最后,在ID-e CK模型下给出了新协议的安全性证明。 To solve the problems just like limited satellite computing resources and high security requirements on the network nodes, this paper proposed a pairing-free ID-based authenticated key agreement protocol for satellite networks with forward security. Firstly, the satellite generated a random number which was used to compute the session key when received a key nego- tiation request message, then sent this number to the aircraft in an incidental message. These steps could ensure forward security of both satellite and aircraft. Secondly, it took lightweight elliptic curve discrete logarithm (ECDL) instead of bilinear pairing operation at new algorithm, which could save some of the protocol computation overhead. Thirdly, it took an idea of transferring a part of computational overhead to the aircraft, which could release the satellite from heavy tax. Compared with some existing authentication key agreement protocols, pairing-free ID-based authenticated key agreement protocol for satellite networks with forward security has a lower computational overhead. Finally, it proposed a security proof of the new protocol under the ID-eCK model.
出处 《计算机应用研究》 CSCD 北大核心 2015年第12期3714-3717,共4页 Application Research of Computers
基金 国家"863"计划资助项目(2012AA012704)
关键词 卫星通信网络 前向安全 认证密钥协商协议 椭圆曲线离散对数问题 satellite communication network forward security authenticated key agreement protocol elliptic curve discrete logarithm
  • 相关文献

参考文献9

  • 1Yasmin R, Ritter E, Wang Guilin. A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks[C] //Proc of the 5th International Conference on Sensor Technologies and Applications. 2011:340-347.
  • 2徐国愚,陈性元,杜学绘,曹利峰.大规模延迟容忍网络中基于分级身份的认证密钥协商协议[J].计算机应用研究,2013,30(8):2515-2519. 被引量:1
  • 3郭渊博,王超,王良民.UC安全的空间网络双向认证与密钥协商协议[J].电子学报,2010,38(10):2358-2364. 被引量:12
  • 4彭长艳.空间网络安全关键技术研究[D].长沙:国防科学技术大学,2010.
  • 5Seth A, Keshav S. Practical security for disconnected nodes[C] //Proc of the 1st IEEE ICNP Workshop on Secure Network Protocols. [S. l.] :IEEE Press, 2005:31-36.
  • 6Bellare M, Namprempre C, Neven G. Security proofs for identity-based identification and signature schemes[C] //Proc of EUROCRYPT. [S. l.] :Springer, 2004:268-286.
  • 7Yasmin R, Ritter E, Wang Guilin. Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks[J] . International Journal of Information Security, 2014, 13(5):453-465.
  • 8Wang Yongge. Efficient identity-based and authenticated key agreement protocol[C] //Lecture Notes in Computer Science. 2013:172-197.
  • 9Gorantla M C, Boyd C, Nieto J M G. ID-based one-pass authenticated key establishment[C] //Proc of the 6th Australasian Conference on Information Security. [S. l.] :Australian Computer Society, Inc. , 2008:39-46.

二级参考文献18

  • 1CCSDS.CCSDS Operating Plan for Standards Development .http://public.ccsds.org/sites/cwe/cesg/Public/Operating 20 Plan 20-20latest 20version/ A01x2y4x1 20WorkingDec06.doc,2009-09-12.
  • 2CCSDS.CCSDS Security Working Group Meeting Notes .http://cwe.ccsds.org/sea/docs/SEA-SEC/ Meeting Materials/2004/Spring 202004 20Meeting (Montreal)/Spring 2004 Security WG Meeting Minutes.doc,2009-09-12.
  • 3R Canetti.Universally composable security:A new paradigm for cryptographic protocols .Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science (FOCS 2001) .New York:IEEE Computer Society Press,2001.136-145.
  • 4R Canetti,H Krawczyk.Universally composable notions of key exchange and secure channels .Advances in Cryptology,Eurocrypt'02 .LNCS Vol.2332,Berlin:Springer-Verlag,2002.337-351.
  • 5R Canetti,M Fischlin.Universally composable commitments .Advances in Cryptology,Eurocrypt'01 .LNCS Vol.2139,Berlin:Springer-Verlag,2001.19-28.
  • 6I Damgard,Nielsen J.Perfect hiding and perfect binding universally composable commitment schemes with constant expansion factor .Advances in Cryptology,Eurocrypt'02 .LNCS Vol.2442,Berlin:Springer-Verlag,2002.581-596.
  • 7Canetti R,Halevi S,Katz J,et al.Universally composable password-based key exchange .Advances in Cryptology,Eurocrypt'05 .LNCS Vol.3494,Berlin:Springer-Verlag,2005.404-421.
  • 8Goldwasser S,Micali S.A digital signature scheme secure against adaptive chosen-message attacks[J].SIAM Journal on Computing,1998,17(2):281-308.
  • 9毛文波,著,王继林,伍前红,等,译.现代密码学理论与实践[M].2006,北京:电子工业出版社.
  • 10W Mao.Modern Cryptography:Theory and Practice[M].Beijing:Publishing House of Electronics Industry,2004.ag,2003.61-84.

共引文献22

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部