期刊文献+

一个基于辫群的密钥认证方案的安全分析

Cryptanalysis Key Authentication Scheme Based on Braid Group
在线阅读 下载PDF
导出
摘要 密钥认证是保证用户的公钥不被伪造.文章指出卓等人提出的基于辫群的密钥认证方案易受公钥替换攻击.通过修改他们所提方案中注册和证书的生成和认证阶段算法,提出了一个改进的密钥认证方案.该方案在公钥替换攻击下是安全的,并且满足其他安全需求. Key authentication assures that the public key of user can-not be forged.This paper shows that the key authentication scheme based on braid group which is provided by Zhou and others is liable to public key substitution attack and proposes an improved key authentication scheme which revises the user registration and certificate generation phase and key authentication phase algorithms of it.The scheme is secure against the public key substitution attack and satisfies other essential security requirements.
作者 洪东招
出处 《杭州师范大学学报(自然科学版)》 CAS 2010年第2期107-110,共4页 Journal of Hangzhou Normal University(Natural Science Edition)
关键词 密钥认证 不可否认性 辫群 key authentication non-repudiation braid group
  • 相关文献

参考文献17

  • 1Artin E. Theorie der Zopfe[J]. Abh Math Sem Univ Hamburg, 1926,4:47-72.
  • 2Artin E. Theory of braids[J]. The Annals of Mathematics, 1947,48(1) : 101-126.
  • 3Anshel I, Anshel M, Goldfeld D. An algebraic method for public-key eryptography[J].Mathematical Research Letters, 1999,6:287-291.
  • 4Ko K, Lee S, Cheon J, et al. New public key cryptosystem using braid groups[C]//Advances in Cryptology:Procedings of CRYPTO 2000, LNCS 1880. Berlin: Springer-Verlag,2000: 166-183.
  • 5Lee E K, Lee S J, Halm S G. Pseudorandomness from braid groups[C]//Advanees in Cryptology.. Proeedings of CRYPTO 2001, LNCS 2139. Berlin: Springer-Verlag,2001:486-502.
  • 6Anshel I, Anshel M, Fisher B, et al. New key agreement protocols in braid group cryptography[C]//Progress in Cryptology-CT-RSA 2001, LNCS 2020. Berlin: Springer-Verlag,2001 : 13-27.
  • 7Cha J C, Ko K H, Lee S J, et al. An efficient implementation of braid groups[C]//Advanees in Cryptology: Proceedings of ASIA-CRYPT 2001, LNCS 2248. Berlin: Springer-Verlag,2001 : 144-156.
  • 8KoK H, ChoiD H, ChoMS, etal. New signature scheme using conjugacy problem[EB/OL] .(2002-11-11)[2009-11-19].http:// eprint, iaer. org/2002/168, pdf.
  • 9Sibert H, Dehornoy P, Girault M. Entity authentication schemes using braid word reduction[EB/OL]. (2002-12-13)[2009-11-07]. http://eprint, iacr. org/2002/187, pdf.
  • 10Kim Z, Kim K. Provably-secure identification scheme based on braid groups[C/OL]//The 2004 Symposium on Cryptography and Information Security-SCIS 2004, Sendal, Japan, 2004. [ 2009-11-10 ]. http://eaislab, kaist, ac. kr/Paper/paper_ files/2004/SCIS04/ scis2004 % 20- % 20zeenkim. pdf.

二级参考文献4

  • 1Dehomoy H.New Signature Scheme Using Conjugacy Problem[Z].(2008-05-20).http://eprint.iacr.org/2002/168.pdf.
  • 2Tony T.Undeniable Signature Schemes Using Braid Groups[Z].(2008-05-20).http://arxiv.org/cs.CR/0601049.
  • 3Tony T.Group Signature Schemes Using Braid Groups[Z].(2008-05-20).http://arxiv.org/cs.CR/0602063.
  • 4Sunder L.Authentication Schemes Using Braid Groups[Z].(2008-05-20).http://arxiv.org/cs.CR/0507066.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部