期刊文献+

基于身份的移动互联网高效认证密钥协商协议 被引量:12

Identity-based efficient authentication and key agreement protocol for mobile Internet
下载PDF
导出
摘要 针对椭圆曲线中双线性对运算计算开销较大和PKI中证书管理的问题,利用基于身份的公钥密码算法和椭圆曲线加法群上的GDH困难问题,设计了一种高效安全的认证密钥协商协议,并在随机预言机模型下证明了协议的安全性。分析表明,该协议满足已知会话密钥安全性、完美前向安全性、抗临时密钥泄露攻击和抗会话密钥托管等安全属性,且能够在仅5次标量乘法运算后完成参与方之间的相互认证和会话密钥协商,具有较小的计算开销。 For the bad computation overhead of bilinear pairings in elliptic curve and the problems of certificate man-agement in the PKI, an efficient and secure authentication key agreement protocol was proposed based on the identi-ty-based cryptosystem and GDH difficult problem on the additive group of elliptic curve. Meanwhile, the security of the new protocol was proved under the random oracle model. The analysis shows that the new protocol meets security prop-erties such as known session key security, perfect forward security, ephemeral secret leakage resistance and the session key escrow resistance. The proposed protocol has the good computational overhead for it was able to complete the mutual authentication and session key agreement between parties under only 5 times scalar multiplication.
出处 《通信学报》 EI CSCD 北大核心 2017年第8期19-27,共9页 Journal on Communications
基金 国家自然科学基金资助项目(No.61272519 No.61170297 No.61572080 No.61472258)~~
关键词 基于身份密码学 认证密钥协商 随机预言机模型 椭圆曲线 identity-based cryptosystem, authentication key agreement, random oracle model, elliptic curve
  • 相关文献

参考文献4

二级参考文献51

  • 1彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:56
  • 2田野,张玉军,李忠诚.使用对技术的基于身份密码学研究综述[J].计算机研究与发展,2006,43(10):1810-1819. 被引量:16
  • 3Shamir A. Identity-based cryptosystems and signature schemes [C]. CRYPTO1984, California, 1984, LNCS196: 47-53.
  • 4Boneh D and Franklin M. Identity-based encryption from the Weil pairing [C]. CRYPTO2001, California, 2001, LNCS2139: 213-229.
  • 5Chen L, Cheng Z, and Smart N P. Identity-based key agreement protocols from pairings [J]. Int.J.Inf.Secur, 2(}07, 6(4): 213-241.
  • 6Smart N P. An identity-based authenticated key agreement protocol based on the Weil pairing [J]. Electronics Letters, 2002, 38(13): 650-632.
  • 7Choie Y, Jeong E, and Lee E. Efficient identity-based authenticated key agreement protocol from pairings [J]. Appl. Math. Comput., 2005, 162(1): 179-188.
  • 8McCullagh N and Barreto P S L M. A new two-party identity-based authenticated key agreement [C]. Topics in Cryptology-CT-RSA 2005, San Francisco, 2005, LNCS3376: 262-274.
  • 9Zhu R W, Yang G, and Wong D S. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices [J]. Theoretical Computer Science, 2007, 378(2): 198-207.
  • 10Mao W. Modern Cryptography: Theory and Practice [M]. New Jersey: Prentice Hall, 2003: 166-172.

共引文献74

同被引文献108

引证文献12

二级引证文献98

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部