期刊文献+

对两种密钥协商协议的分析与改进 被引量:3

Security Analysis and Improvement of Two Key Agreement Protocols
下载PDF
导出
摘要 对Chen所提的一种基于身份的多重认证密钥交换协议和一种无证书双方认证密钥协商协议进行了安全性分析,证明其提出的基于身份的多重认证密钥交换协议除了存在基于身份公钥密码体制固有的密钥托管问题之外,还不能满足前向安全性;不使用对的无证书双方认证密钥协商协议也无法抵抗无证书公钥密码体制安全模型中A_(II)类型敌手的攻击.由此,基于椭圆曲线密码体制分别提出新的无证书多重和单重认证密钥交换协议,证明新方案满足已知密钥安全、完美前向安全、抗临时密钥泄漏、抗假冒攻击及抗中间人攻击等安全特性.效率分析表明,新方案在确保安全性的同时具有较高的运算效率. Chen proposed an identity-based authenticated multiple key agreement protocol and a certificateless two-party authenticated key agreement protocol, security analysis shows that the proposed identity-based authenticated multiple key agreement protocol has the key escrow problem existing in identity-based public key cryptography and can not supply forward secrecy either. The proposed certifi- cateless two-party authenticated key agreement protocol without bilinear pairings can not resist the attacks from Attacker AII existing in security model of certificateless public key cryptography. To solve the security problems of Chen's protocols, we proposed a certificate- less two-party authenticated multiple key agreement protocol and a certificateless two-party authenticated single key agreement protocol based on ECC. Then we prove that our new protocols satisfy the known-key security, perfect forward secrecy, against ephemeral key leakage, key-compromise resilience, against Man-in-the middle attack and other security properties a two-party authenticated key agree- ment protocol should have. Meanwhile, the novel schemes avoid bilinear paring operation, efficiency analysis show that they can supply stronger security with lower computational overhead.
出处 《小型微型计算机系统》 CSCD 北大核心 2017年第5期1007-1012,共6页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61100042)资助 海军工程大学自然科学基金项目(20150437)资助
关键词 无证书公钥密码 认证密钥协商协议 计算DIFFIE-HELLMAN问题 椭圆曲线离散对数问题 certificateless cryptography authenticated key agreement computationai diffie-hellman problem elliptic curve discrete logarithm problem
  • 相关文献

参考文献3

二级参考文献33

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4Shamir A. Identity based cryptosystems and signature schemes[C]// Advances in Cryptology CryptoM. Berlin: Springer-Verlag, 1984: 47-53.
  • 5Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]// Advances in Cryptology CryptolQQl. Berlin: Springer-Verlag, 2001: 213-229.
  • 6Shim K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing[J]. Electron Lett, 2003, 39(8): 653-654.
  • 7Smart N P. Identity based authenticated key agreement protocol based on the Weil pairing[J]. Electronics Letters, 2002, 38(13): 630-632.
  • 8Choie Y, Jeong E. Efficient identity-based authenticated key agreement protocol from pairings[J]. Applied Mathematics and Computation, 2005,162(1): 179-188.
  • 9Ryu E, Yoon E, Yoo K. An efficient ID-based authenticated key agreement protocol from pairings[C]// Networking 2004.Berlin: Springer-Verlag, 2004: 1458-1463.
  • 10Yuan Q, Li S. A new efficient ID-based authenticated key agreement protocol[EB/OL]. [2014-03-14]. httpjleprint. iacr. org/2005/309.pdf.

共引文献9

同被引文献17

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部