期刊文献+

基于RLWE支持身份隐私保护的双向认证密钥协商协议 被引量:6

Bidirectional authentication key agreement protocol supporting identity’s privacy preservation based on RLWE
下载PDF
导出
摘要 为了解决执行认证密钥交换协议时通信双方身份隐私保护问题,提出了一种基于C类承诺机制的抗量子攻击的双向认证密钥协商协议。该协议通过C类承诺函数隐藏通信双方的真实身份信息,并基于RLWE困难问题,在保障身份匿名的前提下,通过2轮的消息交互不仅完成了双向身份认证,而且保证了传输消息的完整性,并协商出共享会话密钥。经过分析,在协议执行效率上,完成匿名的双向认证与密钥协商只需2轮的消息传输,与Ding等的协议对比,公钥长度缩短近50%;在安全性上,所提协议能够抵抗伪造、重放、密钥复制和中间人攻击。所提协议在eCK模型下满足可证明安全性,同时所提协议基于格上的RLWE困难问题,可抵抗量子计算攻击。 In order to solve the problem of identity privacy preservation between two participants involved when implementing authenticated key agreement protocol, a bidirectional authenticated key agreement protocol against quantum attack based on C commitment scheme was proposed. Through the design of C commitment function, the real identity information of two participants involved was hidden. Based on RLWE difficult problem, under the premise to ensure identity anonymity, this protocol not only completed two-way identity authentication, but also ensured the integrity of the transmitted message, furthermore, the shared session key was negotiated. After been analyzed, in terms of protocol’s execution efficiency, only two rounds of message transmission were needed to complete anonymous two-way authentication and key agreement in the proposed scheme. Compared with Ding’s protocol, the length of public key was reduced by nearly 50%. With regard to security, the protocol could resist forgery, replay, key-copy, and man-in-the-middle attacks. It is proved that the proposed protocol satisfies the provable security under the eCK model. At the same time, the protocol is based on the RLWE problem of lattices, and can resist quantum computing attacks.
作者 杨亚涛 韩新光 黄洁润 赵阳 YANG Yatao;HAN Xinguang;HUANG Jierun;ZHAO Yang(School of Telecommunication Engineering,Xidian University,Xi’an 710071,China;Department of Electronic and Communication Engineering,Beijing Electronic Science and Technology Institute,Beijing 100070,China)
出处 《通信学报》 EI CSCD 北大核心 2019年第11期180-186,共7页 Journal on Communications
基金 “十三五”国家密码发展基金资助项目(No.MMJJ20170110)~~
关键词 隐私保护 承诺机制 双向认证 环上误差学习问题 privacy preservation commitment mechanism lattice bidirectional authentication ring learning with error
  • 相关文献

参考文献3

二级参考文献17

  • 1BELLARE M, ROGAWAY E Provably secure session key distribution-the three party case[A]. Proceedings of the 27th ACM Symposium on Theory of Computing[C]. Las Vegas: ACM, 1995.57-66.
  • 2CHANG C C, CHANG Y E A novel three-party encrypted key exchange protocol[J]. Computer Standards and Interfaces, 2004, 26(5): 471-476.
  • 3SUN H M, CHEN B C, HWANG T. Secure key agreement protocols for three-party against guessing attacks[J]. Journal of Systems and Software, 2005, 75(1-2): 63-68.
  • 4LEE S W, KIM H S, YOO K Y. Efficient verifier-based key agreement protocol for three parties without server's public key[J]. Applied Mathematics and Computation, 2005, 167(2): 996-1003.
  • 5ABDALLA M, CHEVASSUT O, FOUQUE P A, et al. A simple threshold authenticated key exchange from short secrets[A]. Proc. Asiacrypt'05[C]. Chennai, India, 2005. 566-584.
  • 6KWON J O, JEONG I R, SAKURAI K, et al. Efficient verifier-based password-authenticated key exchange in the three-party setting[J]. Computer Standards and Interfaces, 2007. 513-520.
  • 7LEE S W, KIM H S, YOO K Y. Improvement of Lee and Lee's authenticated key agreement scheme[J]. Applied Mathematics and Computation, 2005, 162(3): 1049-1053.
  • 8KWON J O, HWANG J Y, KIM C W, et al. Cryptanalysis of Lee-Kim-Yoo password- based key agreement scheme[J]. Applied Mathematics and Computation, 2005, 168(2): 858-865.
  • 9HESS F. Efficient identity based signature schemes based on parings[A]. Selected Areas in Cryptography-SAC'02[C]. Springer-Verlag, 2002.310-324.
  • 10BARRETO PSLM, KIM H Y, LYNN B, et al. Efficient algorithms for paring-based cryptosystems[A]. Proceedings of the Crypto'02[C]. Santa Barbara (CA, USA), 2002. 354-369.

共引文献24

同被引文献40

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部