期刊文献+

基于椭圆曲线密码体制的可认证的密钥协商设计与分析 被引量:1

DESIGN OF AUTHENTICATED KEY AGREEMENT BASED ON ELLIPTIC CURVE CRYPTOSYSTEM AND ITS ANALYSIS
在线阅读 下载PDF
导出
摘要 椭圆曲线密码体制以其密钥短、安全强度高、速度快等优越性被广泛用于进行构建数字签名和用户身份认证方案。同样,它也可以用来构建密钥交换协议。Diffie-Hellman密钥协商协议对来自中间人的攻击是脆弱的。基于椭圆曲线离散对数难解性,利用椭圆曲线密码体制的数字签名方案,提出了基于身份认证的密钥协商协议。该协议提供身份认证、密钥确认、完美前向安全性,并能够防止中间人攻击。 Elliptic curve cryptosystem is widely used in digital signature construction and user authentication scheme due to its superiorities of short of the key,high security and high speed, etc. Also it can be used to construct key exchange protocol. The Diffie-Hellman key agreement protocol is vulnerable to intermediate attack. This paper proposes an ID authentication-based key agreement protocol by using the elliptic curve cryptosystem digital signature scheme. The security of this protocol relies on the intractability of elliptic curve discrete logarithm. The protocol can provide identity authentication, key validation,perfect forward security, and defend man-in-the-middle attacks.
出处 《计算机应用与软件》 CSCD 2010年第8期52-54,共3页 Computer Applications and Software
基金 国家高技术研究发展计划(2007AA01Z472) 国家自然科学基金(60633020 60573036)
关键词 椭圆曲线密码 椭圆曲线离散对数 DIFFIE-HELLMAN密钥协商 可认证的密钥协商 Elliptic curve cryptosystem Elliptic curve discrete logarithm Diffie-Hellman key agreement Authenticated Key agreement
  • 相关文献

参考文献9

二级参考文献60

  • 1[1]Whitfield Diffie,Martin Hellman. New Direction in Cryptography[J].IEEE Tran. Inform. Theroy, 1976;22(6) :644-654
  • 2[2]Neal Koblitz.The State of Elliptic Curve Cryptography[J].Designs、Codes and Cryptography,2000; 19:173-193
  • 3[3]J Silverman.The Arithmetic of Elliptic Curves[M].Springer-Verlag,New York, 1986
  • 4[4]J Silverman.Advanced Topics in the Arithmetic of Elliptic Curves[M].Springer-Verlag,New York, 1994
  • 5[5]Public Key Cryptography for Financial Service Industry :The Elliptic Curve Digital Signature Algorithm(ECDSA)[S].ANSI-X9.62-1998, American Bankers Association,Working Draft,1998
  • 6[6]public Key Cryptography for Financial Service Industry:Key Agreement and Key Transport Using Elliptic Curve Cryptography[S].ANSI-X9.63-1998 ,American Bankers Association,Working Draft,1998.8
  • 7[7]Standard Specifications for Public Key Cryptography. IEEE P1363,Http:∥www.ieee .org/grouper/1363/contrib .html, 2000.8
  • 8[8]Http:∥www.ietf. cnri.reston.va.us
  • 9[9]D Terr.A Modification of Shanks'Baby-step Giant-step Algorithm[J].Mathematics of Computation, 1999; 69 (230): 767-773
  • 10[10]A Odlyzko. Discrete Logarithms in Finite Fields and Their Cryptographic Significance[C].In:Eurocrypt'84,LNCS 209,1985:224-314

共引文献70

同被引文献13

引证文献1

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部