期刊文献+

一种安全的双实体单向可认证密钥协商方案

Secure one-pass and two-party authenticated key agreement protocol
下载PDF
导出
摘要 为增加密钥协商协议的安全性,提高会话密钥协商的效率,提出一种双实体单向可认证的密钥协商方案。在该方案中,协议发送方首先向接收方发送一个无证书数字签名,签名中包含发送方公钥、标识号、时间戳等能鉴别身份的信息;然后,接收方验证数字签名的有效性,并利用Diffie-Hellman密钥交换协议与发送方建立会话密钥。该方案不仅在随机预言模型下可证明是安全的,而且也同时满足会话密钥安全性、前向安全性、会话密钥的不可控性和抗密钥泄露伪造攻击等安全属性。 In order to improve the security and efficiency of the key agreement protocol, a secure one-pass and two-party authenticated key agreement protocol is proposed. In this protocol,a certificateless digital signature is sent to the receiver,in which the sender's public key,identification number,time stamp, and other identifiable information are signed. Then, the receiver verifies the variety of the digital signature. The session key is built by using the Diffie-Hellman key agreement protocol. The new protocol can be proved to be secure in random ora- cle model;it can also satisfy the properties of known session key secrecy, forward secrecy,uncontrollability of the session key and key compromise impersonation resilience.
出处 《河南理工大学学报(自然科学版)》 CAS 北大核心 2017年第5期89-94,共6页 Journal of Henan Polytechnic University(Natural Science)
基金 国家自然科学基金资助项目(61272525) 河南省基础与前沿技术研究项目(152300410129) 河南省高等学校重点科研项目(16A520096) 郑州轻工业学院2015年研究生科技创新基金资助项目
关键词 无证书数字签名 单向可认证 密钥协商 前向安全 Certificateless digital signature, authentication, key agreement, forward secrecy
  • 相关文献

参考文献2

二级参考文献28

  • 1WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 2SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 3DiffieW, Van Oorschot P C, Wiener M J. Authentication and authenticated key exchanges [J]. Designs, Codes and Cryptography, 1992, 2(2): 107-125.
  • 4Adams C, Lloyd S. Understanding public-key infrastructure-concepts, standards, and deployment considerations [M]. Indiana, USA: Sarns, 1999.
  • 5Shamir A. Identity-based cryptosystems and signature schemes [C]//Proc 4th Annual International Cryptology Conference on Advances in Cryptology. New York, NY, USA: Springer-Verlag, 1984:47-53.
  • 6AI Riyami S S, Paterson K G. Certificateless public key cryptography [C]//Proc 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin, Germany: Springer-Verlag, 2003: 452- 473.
  • 7Dutta R, Barua R, Sarkar P. Pairing-based cryptographic protocols: a survey [R/OL]. (2004-06-24). http: //eprint. iacr. org/2004/064.
  • 8Joux A. A one round protocol {or tripartite Diffie-Hellman [C]//Proc 4th international symposium on algorithmic number theory. London, UK: Springer-Verlag, 2000: 385- 393.
  • 9Boneh D, Franklin M K. Identity based encryption from the Weii pairing [C]//Proc 21st Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 2001: 213- 229.
  • 10Mandt T K, Tan C H. Certificateless authenticated two-party key agreement protocols [C]//Proc 11th Annual Asian Computing Science Conference. Berlin, Germany: Springer-Verlag, 2006 :37 - 44.

共引文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部