期刊文献+

改进的基于口令的群密钥协商协议 被引量:4

Improved Password-based Group Key Agreement Protocol
在线阅读 下载PDF
导出
摘要 群密钥协商协议是保证后续群组安全通信的重要手段之一。为此,研究Byun和Lee提出的基于口令的群密钥协商协议,指出该协议不能抵抗不可检测的在线字典攻击。基于这个发现,对该方案进行改进,提出一种新的群密钥协商协议。安全性分析表明,该协议可以抵抗基于口令的群密钥协商协议的常见攻击。 Group key agreement protocol is an important mechanism to ensure the security of subsequent communication. This paper researches a password-based Group Key Agreement(GKA) protocol proposed by Byun and Lee and finds that this protocol is vulnerable to undetectable on-line dictionary attacks. Based on this finding, it improves this protocol and presents a new GKA protocol. Security analysis shows that the protocol is resistant to the attacks available for password-based GKA protocols.
出处 《计算机工程》 CAS CSCD 北大核心 2011年第3期132-133,136,共3页 Computer Engineering
基金 湖南省教育教学改革研究基金资助项目(ZJGB2009010)
关键词 信息安全 群密钥协商 基于口令的认证 字典攻击 information security Group Key Agreement(GKA) password-based authentication dictionary attack
  • 相关文献

参考文献13

  • 1Ingermarsson I.A Conference Key Distribution System[J].IEEE Transactions on Information Theory,1982,28(5):714-720.
  • 2Chung W,Choi W,Kim Y,et al.The Design of Conference Key Distribution System Employing a Symmetric Balanced Incomplete Block Design[J].Information Processing Letters,2002,81(6):313-318.
  • 3CAI Yongquan WANG Yali.Identity-Based Conference Key Distribution Protocol with User Anonymity[J].Chinese Journal of Electronics,2007,16(1):179-181. 被引量:3
  • 4YiXun,Siew C K,Tan C,et al.A Secure Conference Scheme for Mobile Communications[J].IEEE Transactions on Wireless Communication,2003,2(6):1168-1177.
  • 5Oliveira L B,Wong H C,Loureiro A A F,et al.On the Design of Secure Protocols for Hierarchical Sensor Networks[J].Intemational Journal of Security and Networks,2007,2(3/4):216-227.
  • 6Burmester M,Desmedt Y.A Secure and Efficient Conference Key Distribution System[C]//Proc.of EUROCRYPT'94.Berlin,Germany:Springer,1994:275-286.
  • 7李国民,何大可.群密钥协商协议ID-AGKA的分析与改进[J].计算机工程,2009,35(6):148-149. 被引量:3
  • 8杨红梅,胡予濮,赵英华,高玮.标准模型下基于口令的群密钥协商协议[J].计算机工程,2009,35(19):141-144. 被引量:1
  • 9Steiner M,Tsudik G,Waidner M.Key Agreement in Dynamic Peer Groups[J].IEEE Transactions on Parallel and Distributed Systems,2000,11(8):769-780.
  • 10Abdalla M,Bresson E,Chevassut O,et al.Password-based Group Key Exchange in a Constant Number of Rounds[C]//Proc.of the 9th International Workshop on Theory and Practice in Public Key Cryptography.Berlin,Germany:Springer,2006:427-442.

二级参考文献15

  • 1Joux A. One Round Protocol for Tripartite Diffie-Hellman[C]// Proceedings of Algorithmic Number Theory Symposium.[S. l.]: Springer-Verlag, 2000.
  • 2Al-Riyami S, Paterson K G. Tripartite Authenticated Key Agreement Protocols from Pairings[C]//Proc. of Conf. on Cryptography and Coding. [S. l.]: Springer-Verlag, 2003.
  • 3Zhang Fangguo, Liu Shengli, Kwangjo K. ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings[C]// Proceedings of IEEE International Symposium on Information Theory. Yokohama, Japan: [s. n.], 2003.
  • 4Nalla D, Reddy K C. Identity Based Authenticated Group Key Agreement Protocol[C]//Proceedings of INDOCRYPT'02. [S. l.]: Springer-Verlag, 2002.
  • 5Barua R, Dutta R, Sarker E Extending Joux's Protocol to Multi Party Key Agreement[C]//Proc. of INDOCRYPT'03. [S. l.]: Springer-Verlag, 2003.
  • 6Choi K Y, Hwang J Y, Lee D H. Efficient ID-based Group Key Agreement with Bilinear Maps[C]//Proceedings of Public-Key Cryptography. [S. l.]: Springer-Verlag, 2004.
  • 7Burmester M, Desmedt Y. A Secure and Efficient Conference Key Distribution System[C]//Proc. of Eurocrypt'94. [S. l.]: Springer-Verlag, 1995.
  • 8Burmester M, Desmedt Y. A Secure and Scalable Group Key Exchange System[J]. Information Processing Letters, 2005, 94(3): 137-143.
  • 9Diffe W, Hellman M. New Directions in Cryptography[J]. IEEE Trans. on Information Theory, 1976, 22(6): 644-654.
  • 10Burmester M, Desmedt Y. A Secure and Scalable Group Key Exchange System[J]. Information Processing Letters, 2005, 94(3): 137-143.

共引文献4

同被引文献37

  • 1王晓峰,张璟,王尚平,张亚玲,秦波.基于口令认证的移动Ad Hoc网密钥协商方案[J].软件学报,2006,17(8):1811-1817. 被引量:18
  • 2Abdalla M, Fouque P A, Pointcheval D. Password-based Authenti- cated Key Exchange in the Three-party Setting[C] //Proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography. Berlin, Germany: [s. n.] , 2005.
  • 3Abdalla M, Pointcheval D. Simple Password-based Encrypted Key Exchange Protocols[C] //Proceedings of Cryptology-CT-RSA’05. San Francisco, California, USA: Springer-Verlag, 2005.
  • 4Lu Rongxing, Cao Zhenfu. Simple Three-party Key Exchange Protocol[J]. Computers & Security, 2006, 26(1): 94-97.
  • 5Guo Hua, Li Zhoujun, Mu Yi, et al. Cryptanalysis of Simple Three- party Key Exchange Protocol[J]. Computers & Security, 2008, 27(1/2): 16-21.
  • 6Kin Hyun-Seok, Choi Jin-Young. Enhanced Password-based Simple Three-party Key Exchange Protocol[J]. Computers and Electrical Engineering, 2009, 35(1): 107-114.
  • 7Lee Tian-Fu, Hwang Tzonelih, Lin Chun-Li. Enhanced Three- party Encrypted Key Exchange Without Server Public Keys[J]. Computers and Security 2004, 23(7): 571-577.
  • 8Xun Yi. Efficient ID-based Key Agreement from Weil Pairing[J]. Electronics Letters, 2003, 39(13): 206-208.
  • 9Boyd C, Mao W, Paterson K. Deniable Authenticated Key as Abolishment for Internet Protocols[C]//Proceedings of Workshop on Security Protocols. Heidelberg, Germany: Springer-Verlag, 2003: 255-271.
  • 10Shoup V. Sequences of Games: A Tool for Taming Complexity in Security Proofs[EB/OL]. (2004-10-20). http://eprint.iacr. org/2004/ 332.pdf.

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部