期刊文献+

改进的基于身份认证密钥协商协议 被引量:3

Improvement of ID-based authenticated key exchange protocol
在线阅读 下载PDF
导出
摘要 对标准模型下可证安全的基于身份认证密钥协商协议进行安全分析,指出由于传送消息存在冗余,协议不能抵御伪装攻击。为解决上述安全漏洞,提出一个改进的基于身份认证密钥协商协议,并在标准模型下分析其安全性。结果表明,新协议满足基于身份认证密钥协商协议的所有安全要求。 Analyzed the security of a recently proposed ID-based authenticated key exchange protocol without random oracles, it was shown that the protocol suffer from impersonation attacks due to redundancy of the exchange messages. To overcome this problem,presented an improved version of the protocol and gave security analyses in the standard model. Resuhs show that it satisfies all the security requirements of an ID-based authenticated key exchange protocol.
作者 舒剑 许春香
出处 《计算机应用研究》 CSCD 北大核心 2010年第1期218-219,共2页 Application Research of Computers
基金 国家"863"计划资助项目(2009AA012415)
关键词 基于身份 伪装攻击 冗余 标准模型 ID-based impersonation attacks redundancy standard model
作者简介 舒剑(1972-),男,江西南昌人,博士研究生,主要研究方向为密码学与信息安全(mikeshujian@uestc.edu.cn) 许春香(1965-),女,湖南宁乡人,教授,博导,主要研究方向为密码学与信息安全
  • 相关文献

参考文献10

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography [ J ]. IEEE Trans on Info Theory,1976,22(6) :644-654.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes [ C ]//Proc of CRYPTO ' 84. Berlin : Springer-Verlag, 1984:47-53.
  • 3BONEH D, FRANKLIN M. Identity based encryption from the Weil pairing [ C ]//Proc of CRYPTO 2001. Berlin : Springer-Verlag, 2001 : 213-229.
  • 4CHEN L, KULDA C. Identity based authenticated key agreement protocols from pairing [ C ]//Proc of the 16th IEEE Computer Security Foundations Workshop. New York : IEEE Press, 2003 : 219- 233.
  • 5MCCULLAGH N, BARRETO P. A new two party identity-based authenticated key agreement [ C ]//Proc of RSA Conference. Berlin: Springer-Verlag, 2005 : 262- 274.
  • 6CHOIE Y,JEONG E, LEE E. Efficient identity-based authenticated key agreement protocol from pairings [ J ]. Journal of Applied Mathematics and Computation ,2005,162( 1 ) : 179-188.
  • 7BELLARE M, ROGAWAY P. Random oracles are practical: a paradigm for designing efficient protocols[C]//Proc of the 1st ACM Conference on Computer and Communication Security. New York : ACM Press, 1993:62-73.
  • 8王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议[J].计算机学报,2007,30(10):1842-1852. 被引量:42
  • 9汪小芬,陈原,肖国镇.基于身份的认证密钥协商协议的安全分析与改进[J].通信学报,2008,29(12):16-21. 被引量:23
  • 10GENTRY C. Practical identity-based encryption without random oracles [ C ]//Proc of EUROCRYPT2006. Berlin: Springer-Verlag, 2006:445- 464.

二级参考文献43

  • 1DIFFIE W, HELLMAN M E. New directions in cryptography[J]. IEEE Trans Info Theory, 1976, 22(6): 44-654.
  • 2SHAMIR A. Identity-based cryptosystems and signature schemes[A]. Advances in Cryptology---Crypto'84[C], Berlin: Springer-Verlag, 1984.47-53.
  • 3OKAMOTO E. Proposal for identity-based key distribution system[J]. Electron Letters, 1986, 22: 1283-1284.
  • 4TANAKA K, OKAMOTO E. Key distribution system for mail systems using D-related information directory[J]. Computer Security, 1991, 10:5-33.
  • 5BONEH D, FRANKLIN M. Identity based encryption from the Weft pairing[A]. Advances in Cryptology---Crypto 2001[C]. Berlin: Springer- Verlag, 2001.213-229.
  • 6SMART N E An identity based authenticated key agreement rotocol based on the Weil pairing[J]. Electro Letters, 2002, 38:30-632.
  • 7XUN Y. Efficient ID-based key agreement from the Weil pairing[J]. IEE Electronics Letters, 2003, 39(2): 206-208.
  • 8SHIM K. Efficient ID-based authenticated key agreement protocol based on the Well pairing[J].IEE Electronics Letters,2003, 39(8): 653-654.
  • 9SUN H, HSIEH B. Security analysis of Shim's authenticated key agreement protocols from pairings[EB/OL], http://eprint.iacr.org/2003/113.
  • 10MCCULLAGH N, BARRETO E A new two party identity-based authenticated key agreement[A]. Proceedings of the RSA Conference 2005[C]. Berlin: Springer-Verlag, 2005.262-274.

共引文献49

同被引文献25

  • 1BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[J].ACM Trans on Computer Systems,1990,8(1):18-36.
  • 2RAY I,NATARAJAN N.An anonymous and failure resilient fair-exchange e-commerce protocol[J].Decision Support Systems,2005,39(3):267-292.
  • 3KATSAROS P,ODONTIDIS V,GOUSIDOU-KOUTITA M.Colored Petri net based model checking and failure analysis for e-commerce protocols[C] //Proc of the 6th Workshop and Tutorial on Practical Use of Colored Petri Nets and the CPN Tools.2005:267-283.
  • 4CPNTools-help[EB/OL].http://wiki.daimi.au.dk.
  • 5袁崇义.Petri网原理[M].北京:北京大学出版社,1999.
  • 6MENEZES A, ORSCHOT P, VANSTONE S. Handbook of applied cryptography [ M ]. New York: CRC Press, 1996: 425-460.
  • 7BOYD C, PARK D G. Public key protocols for wireless communications[ C ] // Proceedings of the ICISC 1998. Seonl: KIISC, 1998 : 47-57.
  • 8SHOUP V. On formal models for secure key exchange [EB/OL]. [2011-05-15]. http: // www. shoup, net/ paper/skey, ps.
  • 9VIET D Q, YAMAMURA A, password-based authenticated Proceedings of INDOCRYPT. 2005 ; 244-257. TANAKA H. Anonymous key exchange [ C ] // Berlin : Springer-Verlag,.
  • 10CHAI Z C, CAO Z F, LU R X. Efficient password-based authentication and key exchange scheme preserving user privacy[ C ]//WASA 2006. Heidelberg: Springer-Verlag, 2006 : 467-477.

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部