期刊文献+

高效安全的无证书密钥协商方案 被引量:10

Efficient and secure certificateless key agreement protocol
在线阅读 下载PDF
导出
摘要 在网络信息安全领域,服务器与客户机之间的密钥协商显得非常必要。无证书公钥密码是为了克服基于身份密码的密钥托管性质提出来的,它结合了传统公钥证书密码体系和基于身份的公钥体系的优点。应用椭圆曲线的配对运算,提出了一个两方的无证书密钥协商协议,其中每一方只需计算一个配对,并证明了它在ECK模型下的安全性。与其他无证书密钥协商协议相比,安全性和效率都更好。 In the area of network information security, key agreement is essential between servers and clients. To overcome the key escrow property of identity-based cryptography, proposed certificateless public key cryptography, it combined the advantages of the traditional PKI and the identity-based cryptography. This paper proposed a new certificateless two-party key agreement protocol using pairing operation in elliptic curves, it only required each party to compute one pairing. Proved its security in ECK( extended Canetti-Krawezyk) model. Compared with existing eertifieateless protocols, the newly proposed key agreement protocol has better security and efficiency.
出处 《计算机应用研究》 CSCD 北大核心 2009年第12期4787-4789,共3页 Application Research of Computers
基金 国家自然科学基金资助项目(60673079) 国家"863"计划资助项目(2006AA01Z424)
关键词 密钥协商 无证书公钥密码 双线性配对 key agreement certificateless public key cryptography bilinear pairing
作者简介 朱志馨(1986-),女,福建龙海人,硕士研究生,主要研究方向为公钥密码与信息安全(xmuzzx@gmail.com); 董晓蕾,女,副教授,博士,主要研究方向为数论密码、信息安全和可信计算等.
  • 相关文献

参考文献5

  • 1AL-RIYAMI S S, PATERSON K. Certificateless public key cryptography [ C ]// Proc of ASIACRYPT 2003. Berlin: Springer-Verlag, 2003:452-473.
  • 2LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange[ C ]//Proc of Sec 2007. Berlin: Springer-Verlag, 2007:1 - 16.
  • 3MANDT T K. Certificateless authenticated two-party key agreement protocols[ D ]. Oppland : Gjφvik University College, 2006.
  • 4BLAKE-WILSON S, JOHNSON D, MENEZES A. Key agreement protocols and their security analysis[ C ]//Proc of the 6th IMA International Conference on Cryptography and Coding. Berlin: Springer- Verlag, 1997: 30-45.
  • 5KUDLA C J. Special signature schemes and key agreement protocols [ D]. London: University of London, 2006.

同被引文献76

  • 1赵华伟,李大兴.密钥交换协议的安全性分析[J].山东大学学报(理学版),2006,41(4):101-106. 被引量:6
  • 2WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//ASIACRYPT’03.LNCS,2003,2894:452-473.
  • 5Mandt T K,Tan C H.Certificateless authenticated two party key agreement protocols[C]//ASIAN 2006.LNCS,2008,4435:37-44.
  • 6Wang S B,Cao Z F,Bao H Y.Efficient certificateless authentication and key agreement(CL-AK) for grid computing[J].International Journal of Network Security,2008,7(3):342-347.
  • 7Blanchet B,Abadi M,Fournet C.Automatic verification of selected equivalences for security protocols[J].Journal of Logic and Algebraic Programming,2008,75(1):3-51.
  • 8Blanchet B.Automatic verification of correspondences for security protocols[J].Journal of Computer Security,2009,17(4):363-434.
  • 9Chen L,Kudla C.Identity-based authenticated key agreement protocols from pairings [C]//Proceedings of the 16th IEEE Computer Security Foundations Workshop.2003:219-233.
  • 10Kim S,Lee H,Oh H.Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment [C]//ICICS 2005.LNCS,2005,3783:323-335.

引证文献10

二级引证文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部