期刊文献+

具有后向安全的认证密钥协商协议 被引量:2

Having Backward Secure Authenticated Key Agreement Protocol
下载PDF
导出
摘要 在密码协议中,密钥泄露是一个不容忽视的问题.然而当前很多的基于身份的无证书认证密钥协商方案都没有很好的解决这个问题.由于密钥隔离密码系统(Key-Insulated Cryptosystem)是基于密钥隔离思想,也就是说由用户根据协助器在相应的时间段内提供的信息来计算用户的临时私钥,从而协议可以同时满足前向和后向安全性.我们在杜瑞颖等提出的无证书密钥隔离签名方案的基础上,运用密钥进化理论,设计了一种新型的基于身份的无证书密钥隔离认证密钥协商协议.通过对新协议的安全性分析表明,新协议能够满足认证密钥协商协议所必须的安全属性,而且还能够满足后向安全性,避免了密钥泄露带来的危险,并且协议能够抵御侧信道攻击. Key leakage is not a concern to take lightly in cryptographic protocol. In viewof the present ID-based certificateless authenticated key agreement protocol and most of them can't resist the threat of key leakage. Because the key insulated cryptosystem is based on the key idea of insulation,and that is to say that user assistance is provided in the corresponding time period according to the information to calculate the user's temporary private key,thus the newprotocol can also achieve the forward and backward security.Basing on a certificateless key insulated signature scheme proposed by Du Rui-Ying's etal by incorporating the idea of key evolution;we design an ID-based certificateless key-insulated authenticated key agreement protocol. The security of the newscheme were analyzed and the result shows that the newprotocol enjoys the known security properties of the authenticated key agreement protocol and the backward security,which eliminates the key leakage problem and the protocol can resist side channel attack.
出处 《小型微型计算机系统》 CSCD 北大核心 2016年第7期1398-1401,共4页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61272112)资助
关键词 密钥隔离 认证 密钥协商 无证书 基于身份 key-insulated authenticate key agreement certificateless ID-based
  • 相关文献

参考文献5

二级参考文献60

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4Al-Riyami S, Paterson K. Certificateless public key cryptography [ C]. Proceedings of the Asiacrypt 2003, Lecture Notes in Computer Science 2894, Taipei, Taiwan: Spdnger-Vedag, 2003 : 452- 473.
  • 5Tarjei K Mandt, Chik How Tan. Certieateless authenticated twoparty key agreement protocols [ C ]. Proceedings of the ASIAN 2006, Lecture Notes in Computer Science 4435, Tokyo, Japan: Springer-Verlag ,2006 : 3744.
  • 6LaMacchia B A, Lauter K, Mityagin A. Stronger security of authenticated key exchange [ C ]. Proceedings of the ProvSec 2007, Lecture Notes in Computer Science 4784, Wollongong, Australia: Springer-Verlag, 2007,1 -16.
  • 7Swanson C M. Security in key agreement: two-party certificateless schemes[ D/OL]. http://uwspace. uwaterloo. ca/bitstream/10012 /4156/1/Swanson_Colleen. pdf, 2008. Master Thesis, University of Waterloo, 2009-01-29.
  • 8Lippold G, Boyd C, Nieto J G. Strongly secure certificateless key agreement[ C]. Proceedings of the Pairing 2009, Lecture Notes in Computer Science 5671, Ca, USA: Springer-Verlag, 2009, 206- 230.
  • 9Cash D, Kiltz E, shoup V. The twin diffie-hcllman problem and applications[ C]. Proceedings of the EUROCRYPT 2008. LNCS 4965. Istanbul, Turkey: Springer-verlag, 2008, 127-145.
  • 10Cash D, Kiltz E, shoup V. The twin diffic-hellman problem and applications[ J]. Journal of Cryptology, 2009, 22(4) : 470-504.

共引文献46

同被引文献16

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部