期刊文献+

基于身份认证的非对称群组密钥协商协议在气象信息安全中的研究

Research on Asymmetric Group Key Agreement Protocol Based on Identity Authentication in Meteorological Information Security
下载PDF
导出
摘要 在气象信息技术快速发展的当下,气象信息安全成为研究要点。密钥协商协议能够产生一个共同会话密钥,从而保证群组内气象信息加解密的安全性,群组成员参与通信需要身份认证来确保身份的真实性。为了实现气象数据中密钥协商和身份认证,文章研究了基于身份认证的非对称群组密钥协商协议,利用身份认证和安全分层来使协议更加安全可靠,并最终完成气象数据在群组内信息的安全加解密。 With the rapid development of meteorological information technology,meteorological information security has become a key research point.The key negotiation protocol can generate a common session key to ensure the security of encryption and decryption of meteorological information in the group.Group members need identity authentication to ensure the authenticity of their identities.In order to realize key negotiation and identity authentication in meteorological data,this paper studies the asymmetric group key negotiation protocol based on identity authentication,uses identity authentication and security layer to make the protocol more secure and reliable,and finally completes the security encryption and decryption of meteorological data in the group information.
作者 俞鸿霄 马媛 Yu Hongxiao;Ma Yuan(Meteorological Information Center of Qinghai Province,Xining 810001,China)
出处 《青海科技》 2023年第3期91-95,共5页 Qinghai Science and Technology
关键词 密码学 密钥协商 身份认证 群组密钥协商 气象信息安全 Cryptography Key negotiation Identity authentication Group key negotiation Meteorological information security
  • 相关文献

参考文献5

二级参考文献61

  • 1李俊全,刘木兰.椭圆曲线素阶群上的离散对数求解[J].系统科学与数学,2004,24(4):443-450. 被引量:1
  • 2Rafaeli S, Hutchison D. A survey of key management for secure group communication [J]. ACM Computing Surveys, 2003, 35(3): 309-329.
  • 3Zhao Xingwen, Zhang Fangguo, Tian Haibo. Dynamic asymmetric group key agreement for ad hoc networks [J]. Ad Hoc Networks, 2011, 9(5): 928-939.
  • 4Cao X, Kou W, Du X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15): 2895- 2903.
  • 5Chang Tingyi, Hwang Minshiang, Yang Weipang. A communication efficient three-party password authenticated key exchange protocol [J]. Information Sciences, 2011, 181 (1): 217-226.
  • 6Guo Hua, Li Zhoujun, Mu Yi, et al. Provably secure identity based authenticated key agreement protocols with malicious private key generators [J]. Information Sciences, 2011, 181(3):628-647.
  • 7Zhang L, Zhang F, Wu Q, et al. Simulatable certificateless two-party authenticated key agreement protocol[J]. Information Sciences, 2010, 180(6): 1020-1030.
  • 8Just M, Vaudenay S. Authenticated multi-party key agreement [G] //LNCS 1163: Proc of the 1996 Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 1996: 36-49.
  • 9Burmester M, Desmedt Y. A secure and scalable group key exchange system [J]. Information Processing Letters, 2005, 94(3): 137-143.
  • 10Bohli JM, Glas B, Steinwandt R. Towards provably secure group key agreement building on group theory [G] //LNCS 4341: Proc of Cryptology-VIETCRYPT. Berlin: Springer, 2006:322-336.

共引文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部