期刊文献+

完美前向安全的匿名会议密钥分配协议 被引量:1

Anonymous conference key distribution scheme with perfect forward security
在线阅读 下载PDF
导出
摘要 为了克服当前大多数匿名会议密钥建立协议都只能提供部分前向安全性,不能提供完美前向安全性的缺点,利用基于身份的密码体制和双线性配对,提出一个匿名会议分配协议,在单向哈希函数(OWH)和Diffie-Hellman(BDH)假设的保护下,该协议能够抵抗被动攻击、假冒攻击和共谋攻击。同时,通过让私钥生成器(PKG)为所有的参与者分配1个随机数。研究结果表明,该协议能够提供完美前向安全性,即使所有参与者(包括会议主席)的私钥受到了威胁,之前由会议主席使用这些私钥建立并且分配的会议密钥也不会受到威胁。 Based on the fact that most anonymous conference key distribution (CKD) systems cannot provide forward security, which is a very important property, even though some CKD systems provide the property, they can only provide partial forward security, but not perfect forward security, an identity-based CKD scheme with user anonymity was proposed. Under the one-way hash (OWH) and bilinear Diffie-Hellman (BDH) cryptographic assumptions, the proposed scheme is secure against passive attacks, impersonation attacks and conspiracy attacks. Moreover it can distribute a random number to the participants through the private key generator (PKG). The results show that this scheme provides perfect forward security, that is, even if the private keys of all the participants (including the chairman) are compromised, the conference key contributed by the chairman in the past will not be compromised.
出处 《中南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2008年第5期1064-1067,共4页 Journal of Central South University:Science and Technology
基金 国家自然科学基金资助项目(60773035)
关键词 会议密钥分配 完美前向安全 匿名性 身份 conference key distribution (CKD) perfect forward security user anonymity identity
  • 相关文献

参考文献2

二级参考文献10

共引文献3

同被引文献9

  • 1刘锋,张建中.基于椭圆曲线的会议密钥分配方案[J].计算机应用研究,2006,23(7):106-107. 被引量:1
  • 2杨宗凯,谢海涛,程文青,谭运猛.一种基于身份的分布式会议密钥分发方案[J].计算机科学,2007,34(1):115-116. 被引量:2
  • 3刘锋,何业锋,张建中.基于身份的会议密钥分配方案[J].计算机工程与应用,2007,43(6):117-118. 被引量:1
  • 4HWANG Min-shiang. Dynamic participation in a secure conference scheme for mobile communications [J]. IEEE Trans Veh Tech, 1999, 48(5): 1469-1474.
  • 5YI X, SlEW C K, TAN C H. A secure and efficient conference scheme for mobile communications [J]. IEEE Trans Veh Tech, 2003, 52(4): 784-793.
  • 6KIM Y, PERRIG A, TSUDIK G. Group key agreement efficient in communication [J]. IEEE Trans Comput, 2004, 53(7): 905-921.
  • 7TZENG W G. A secure fault-tolerant conference-key agreement protocol [J]. IEEE Trans Comput, 2002, 51(4) : 373-379.
  • 8HUANG Kuo-hsuan, CHUNG Yu-fang, LEE Hsiu-hui, et al. A conference key agreement protocol with faulttolerant capability [J]. Comput Stand & Interfaces, 2009, 31(2): 401-405.
  • 9关志峰,王斌,夏斌,宋朝霞.一种分布式的容侵会议密钥分发方案[J].扬州大学学报(自然科学版),2008,11(2):50-52. 被引量:1

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部