期刊文献+

一种基于身份可认证两方密钥协商方案 被引量:2

A two-party key agreement scheme based on authenticated identity
下载PDF
导出
摘要 为了降低计算开销,提高安全性,通过Diffie-Hellman协议建立密钥共享,结合用户身份信息,以VBNN_IBS签名思想作为基础,提出了一种可认证的两方密钥协商方案。密钥生成中心KGC结合用户身份信息仅为用户生成部分私钥和公钥,其完整的私钥和公钥由用户结合自己的长期私钥生成,安全性基于椭圆曲线离散对数问题。方案中无双线性对运算,只需椭圆曲线上4次点乘运算、1次模运算、3次哈希运算,通信双方只需2次通信就可实现双方认证和密钥协商,提高了密钥产生的效率。分析表明,该方案具有完美前向保密性、抗密钥泄露伪装攻击、已知会话密钥通信安全、非密钥控制、抗重放攻击等安全属性。性能及安全性比较表明,该方案在安全性和性能方面具有较大的优势,适用于资源受限的无线网络通信环境中。 Based on the establishment of shared key through the Diffie-Hellman agreement in terms of the user's identity information and combined with VBNN-IBS signature thought as a foundation,a two-party key agreement scheme is proposed so as to reduce the computation cost and improve the security.In the scheme,the key generation centre(KGC)uses users'identity information to generate part of the private and public keys for the two parties in communication.The complete private key and public key are composed of users'private key for a long time,and the security is based on elliptic curve discrete logarithm problem.The no-bilinear paring operation is realized only by four times point multiplication operation,one modular operation,and three times hash operations.Meanwhile,the two parties in communication can realize the authentication and key agreement only by communication twice,which improves the efficiency of the key generation.It shows that the scheme possess a lot of safety properties,such as perfect forward secrecy,resisting key leak feinting,known session key communications security,non-key control,and anti-replay attacks capacity,etc.The comparison of performance with security reveals that the scheme has great advantages in terms of safety and efficiency.Therefore,it is suitable for the resource-constrained wireless network communication environment.
出处 《成都理工大学学报(自然科学版)》 CAS CSCD 北大核心 2016年第6期757-761,共5页 Journal of Chengdu University of Technology: Science & Technology Edition
基金 国家自然科学基金项目(21373132) 陕西省教育厅资助项目(16JK1149)
关键词 签名方案 椭圆曲线 身份认证 密钥协商 signature scheme elliptic curve identity authentication key agreement
  • 相关文献

参考文献9

二级参考文献66

共引文献67

同被引文献3

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部