期刊文献+

基于RLWE的身份基认证密钥交换协议 被引量:4

An Identity-Based Authenticated Key Exchange Protocol from RLWE
下载PDF
导出
摘要 提出了一个基于分圆环上错误学习(learning with errors,LWE)问题的身份基认证密钥交换协议,其基本思想是利用环上错误学习(ring learning with errors,RLWE)采样生成系统主私钥,进一步生成用户私钥,通过交换Diffie-Hellman临时公钥,计算用于派生会话密钥的密钥材料.该协议与传统密钥交换协议的区别在于,协议中引入了错误项,以理想格的解码基为工具,详细分析协议的容错性,给出了合理的参数设置建议,从而保证协议以显著概率计算出相同的会话密钥.协议在ID-BJM模型下具有可证明AKE安全性和PKG安全性,并且在双方临时私钥泄露、双方长期私钥泄露以及A的长期私钥和B的临时私钥泄露这3种情况下也可以保证协议的AKE安全. Key exchange protocol allows two or more users to compute share session key via exchange information in the open communication channel,and uses the session key to finish cryptography tasks,such as secure communication and authentication.Recently,it becomes a hotspot research question that how to design authenticated key exchange protocol with lattice-based one-way function.Several lattice-based two-party authenticated key exchange protocols have been proposed.However,how to extend them to the identity-based cryptography background still remains open question.In this paper,an identity-based authenticated key exchange protocol from the learning with errors(LWE)problem over cyclotomic ring is proposed.The protocol generates master key by ring LWE(RLWE)sample algorithm,and further extracts the users'secret key,and computes key materials which derive the share session key via exchanging Diffie-Hellman ephemeral key.The protocol introduces error item,uses encoding bases of ideal lattice as the tool for analyzing error tolerance,and makes reasonable suggests for parameters setting.The protocol achieves provable AKE secure and PKG forward secure in the ID-BJM model.Furthermore,the session key is also secure even if both long private keys are leaked or both ephemeral private key are leaked or A's ephemeral key and B's long private key are leaked.
出处 《计算机研究与发展》 EI CSCD 北大核心 2016年第11期2482-2490,共9页 Journal of Computer Research and Development
基金 国家自然科学基金项目(61272488 61272041 61202491 61601515)~~
关键词 分圆环 环LWE 可证明安全 基于身份的密码 密钥交换协议 cyclotomic ring ring learning with errors(RLWE) provable secure identity-based cryptography key-exchange protocol
  • 相关文献

参考文献2

二级参考文献41

  • 1田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 2Blake-Wilson S,Menezes A.Authenticated Diffie-Hellman key agreement protocols//Proceedings of the SAC' 98,Lecture Notes in Computer Science 1556.Berlin:Springer-Verlag,1999:339-361.
  • 3Diffie W,Hellman M E.New directions in cryptography.IEEE Transactions on Information Theory,1976,22 (6):644-654.
  • 4Shamir A.Identity-based cryptosystems and signature schemes//Proceedings of the CRYPTO'84,Lecture Notes in Computer Science 196.Berlin:Springer-Verlag,1984:47-53.
  • 5McCullagh N,Barreto P S L M.A new two-party identitybased authenticated key agreement//Proceedings of the CTRSA'05,Lecture Notes in Computer Science 3376.Berlin:Springer-Verlag,2005:262-274.
  • 6Boneh D,Franklin M.Identity-based encryption from the Weil pairing//Proceedings of the CRYPTO' 01,Lecture Notes in Computer Science 2139.Berlin:Springer-Verlag,2001:213-229.
  • 7ElGamal T.A public key cryptosystem and signature scheme based on discrete logarithms.IEEE Transaction on Information Theory,1985,31(4):469-472.
  • 8Smart N.An ID-based authenticated key agreement protocol based on the Weil pairing.Electronic Letters,2002,38(13):630-632.
  • 9Shim K.Efficient ID-based authenticated key agreement protocol based on Weil pairing.Electronic Letters,2003,39(8):653-654.
  • 10Chen L,Kudla C.Identity based key agreement protocols from pairings//Proceedings of the 16th IEEE Computer Security Foundations Workshop.Los Alamitos,California:IEEE Computer Society,2002:219-213.

共引文献48

同被引文献9

引证文献4

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部