期刊文献+

对三个无双线性对的密钥协商协议分析 被引量:1

Analysis of Three Pairing-free Authenticated Key Agreement Protocols
在线阅读 下载PDF
导出
摘要 基于椭圆曲线上的无双线性对密钥协商协议以其良好的安全性和执行效率在信息安全领域中得到广泛应用,文章分析了3个基于椭圆曲线上的无双线性对密钥协商协议,指出其在安全性上存在的缺陷,分别对这3个协议进行私钥替换攻击、临时密钥泄露攻击、部分秘密信息泄露攻击等攻击,并基于椭圆曲线离散对数问题对其中1个群组密钥协商协议进行改进。此外,通过协议对比,改进的协议安全性更强,效率比其他有双线性对的群组密钥协商协议更高。 The pairing-free key authenticated agreement protocol over elliptic curves is widely used in the information security field for its good security and execution efficiency.The paper analyzes the security of three pairing-free authenticated key agreement protocolsover elliptic curves.It points out its flaws in the nature of securityand provides private key replacement attack,ephemeral key leakage attack,partial secret information leakage attack and other attack methods to these three protocols respectively,and one of group key agreement protocol is improved based on the elliptic curve discrete logarithm problem.In addition,through protocol comparison,the improved protocol is more secure and more efficient than other group key agreement protocols with bilinear pairing.
作者 程庆丰 阮展靖 张瑞杰 CHENG Qingfeng;RUAN Zhanjing;ZHANG Ruijie(Information Engineering University,Zhengzhou Henan 450002,China;State Key Laboratory of Mathematics Engineering and Advanced Computing,Zhengzhou Henan 450002,China)
出处 《信息网络安全》 CSCD 北大核心 2019年第1期16-26,共11页 Netinfo Security
基金 国家自然科学基金[61872449] 国家自然科学基金青年基金[61501515]
关键词 椭圆曲线 无双线性对 密钥协商 部分秘密信息泄露攻击 elliptic curve pairing-free key agreement partial secret information leakage attack
作者简介 通信作者:程庆丰(1979-),男,辽宁,副教授,博士,主要研究方向为密码学和信息安全,qingfengc2008@sina.com;阮展靖(1996-),男,广西,本科,主要研究方向为密码学和信息安全;张瑞杰(1984-),女,河南,讲师,博士,主要研究方向为智能信息处理。
  • 相关文献

参考文献7

二级参考文献65

  • 1于代荣,杨扬,李盛阳,陈月辉,熊曾刚.基于身份的网格安全体系结构研究[J].四川大学学报(工程科学版),2009,41(2):200-205. 被引量:3
  • 2CAO Chunjie,MA Jianfeng,MOON Sangjae.Provable Efficient Certificateless Group Key Exchange Protocol[J].Wuhan University Journal of Natural Sciences,2007,12(1):41-45. 被引量:8
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4侯盂波,徐秋亮,郭山清.基于无证书的两方认证密钥协商协议[J].软件学报,2009,20(增刊):321-329.
  • 5Shamir A. Identity-based cryptosystems and signature schemes [ C ]//Proceedings of CRYPTO 1984. LNCS 196, Berlin : Springer-Verlag, 1985:47 - 53.
  • 6Boneh D, FrankZin M. Identity-based encryption from the well pairing [ C ]//Proceedings of CRYPTO 2001. LNCS 2139, Berlin : Springer-Verlag,2001:213 - 229.
  • 7Chen Liqun, Cheng Zhaohui, Smart N P. Identity-based key agreement protocols from pairings [ J ]. International Jour- nal of Information Security,2007,6 (4) :213 - 241.
  • 8A1-Riyami S S, Paterson K G. Certificateless public key cryptography [ C ]//Proceedings of ASIACRYPT, 2003. LNCS 2894, Berlin: Springer-Verlag,2003:452 - 473.
  • 9Swanson C, Jao D. A study of two-party certificateless au- thenticated key agreement protocols [ C ]//Proceedings of INDOCRYF'T 2009. LNCS 5922, Berlin: Springer-Verlag, 2009 : 57 - 71.
  • 10Zhang Lei, Zhang Futai, Wu Qianhong, et al. Simulatable certificateless two-party authenticated key agreement proto- co/[ J ]. Information Sciences, 2010, 180 ( 2 ) : 1020 - 1030.

共引文献35

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部