期刊文献+

不同PKG环境下可证安全的基于身份AKA协议 被引量:2

Provably Secure Identity-based Authenticated Key Agreement Protocols in Multiple PKG Environment
在线阅读 下载PDF
导出
摘要 目前大多数基于身份认证密钥协商协议需要参与协议双方在同一个PKG环境下,而实际应用中需要在不同PKG环境下的用户之间也能进行安全通信。该文结合twin Diffie-Hellman问题提出了一个全新的不同PKG环境下的基于身份认证密钥协商协议。利用Cash等人在2008年欧密会上提出的"trapdoor test"技术在eCK模型中将新协议的安全性规约到标准的CDH和BDH假设。 Most available identity-based authenticated key agreement protocols require that both protocol participants are from the same PKG(Private Key Generator) environment.However,safe communication is requisite between protocol participants that are from different PKG environment in practice.In this paper,a new identity-based AKA(Authenticated Key Agreement) protocol is proposed in multiple PKG environment,which makes use of a new technique called twin Diffie-Hellman problem.Moreover,the security of the proposed protocol can be reduced to the standard CDH and BDH assumption in the eCK model,which makes use of the "trapdoor test" technology proposed by Cash et al in Eurocrypt 2008.
出处 《电子与信息学报》 EI CSCD 北大核心 2010年第10期2393-2399,共7页 Journal of Electronics & Information Technology
基金 国家863计划项目(2009AA01Z417) 国家自然科学基金(2007B74)资助课题
关键词 密码学 认证密钥协商 基于身份 双线性对 不同PKG环境 TRAPDOOR test技术 Cryptography Authenticated Key Agreement (AKA) ID-Based Bilinear pairing Multiple Private Key Generator (PKG) environment Trapdoor test technology
  • 相关文献

参考文献10

  • 1Shamir A.Identity based cryptosystems and signature schemes[C].CRYPTO'84,Santa Barbara,California,USA,August 19-22,1984,LNCS 0196:47-53.
  • 2Boneh D and Franklin M.Identity based encryption from the Weil pairing[C].CRYPTO'01,Santa Barbara,California,USA,August 19-23,2001,LNCS 2139:213-229.
  • 3Chen L and Kudla C.Identity based authenticated key agreement protocols from pairing[C].16th IEEE Security Foundations Workshop,Los Alamitos,CA,USA,June 30-July 2,2003:219-233.
  • 4McCullagh N and Barreto P S L M.A new two-party identity-based authenticated key agreement[C].CT-RSA 2005,San Francisco,CA,USA,February 14-18,2005,LNCS 3376:262-274.
  • 5Cash D,Kiltz E,and Shoup V.The twin diffie-hellman problem and applications[C].EUROCRYPT2008,Istanbul,Turkey,April 13-17,2008,LNCS 4965:127-145.
  • 6Huang Hai and Cao Zhen-fu.An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem[C].ASIACCS 2009,Sydney,Australia,March 10-12,2009:363-368.
  • 7Canetti R and Krawczyk H.Analysis of key-exchange protocols and their use for building secure channels[C].EUROCRYPT 2001,Innsbruck,Austria,May 6-10,2001,LNCS 2045:453-474.
  • 8LaMacchia B,Lauter K,and Mityagin A.Stronger security of authenticated key exchange[C].ProvSec 2007,Wollongong,Australia,October 31-November 2,2007,LNCS 4784:1-16.
  • 9Ustaoglu B.Obtaining a secure and effcient key agreement protocol from(H)MQV and NAXOS[J].Designs,Codes and Cryptography,2008,46(3):329-342.
  • 10Chow S S M and Choo K R.Strongly-secure identity-based key agreement and anonymous extension.Information Security,Volume 4779/2007,Springer Berlin Heidelberg,203-220,2007.Cryptology ePrint Archive,Report 2007/018.Full version of this paper(2007).

同被引文献42

  • 1Shamir A. Identity-based cryptosystems and signature schemes [ C ]//Proceedings of Crypto' 84. Berlin : Spring- er-Verlag, 1984:47 - 53.
  • 2Boneh D, Franklin M. Identity basedencryption from the Weil paring [ C ]//Proceedings of Crypto ' 01. Berlin: Springer-Verlag ,2001:213 - 229.
  • 3Smart N P. Identity based authenticated key agreement protocol based on the Weil paring[ J]. Eleetroniest Let- ters ,2002,38 ( 13 ) :630 - 632.
  • 4Then L, Kudla C. Identity based authenticated key agree- ment protocols from pairing [ C]//Proceeding of 16th IEEE Security Foundations Workshop. New York: IEEE Computer Society Press,2003:219 - 233.
  • 5TeCullagh N, Barreto P S L M. A new two-party identity- based authenticated key agreement [ C ]//Proceedings of CT-RSA 2005. Berlin : Springer, 2005. Berlin : Springer, 2005,3376:262 - 274.
  • 63orantla M C,Boyd C,Manuel J. ID-based one-pass auten- tieated key establishment [ C ]//Proceedings of Australa- sian Information Security Conference. Sydney: Australian Computer Society,2008,81 : 39 - 46.
  • 7Yasmin R, Ritter E, Wang Guilin. A pairing-free ID-based one-pass authenticated key establishment protocol for wireless sensor networks[ C]//Proceedings of 5th Inter- national Conference on Sensor Technologies and Appli- cations. Paris : IARIA,2011 : 340 - 347.
  • 8Swanson C,Jao D. A study ol two-party certlllcateless au- thenticated key agreement protocols[ C]//Proceedings of INDOCRYPT 2009. Berlin:Springer,2009:57 -71.
  • 9Canetti R, Krawczyk H. Analysis of key-exchange proto- cols and their use for building secure channels [ C ]/! Proceedings of EUROCRYPT 2001. Berlin: Springer-Ver- lag,2001,2045:453 - 474.
  • 10LaMacchia A B,Lauter K,Mityagin A. Stronger security of authenticated key exchange[C]//Proceedings of PROVSEC 2007. Berlin :Springer-Verlag,2007:4784 : 1 - 16.

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部