期刊文献+

可否认群密钥协商协议的一般化构造方式 被引量:2

Generic construction of deniable group key establishment from group key establishment
在线阅读 下载PDF
导出
摘要 利用Schnorr零知识认证机制,给出了一个构造可否认群密钥协商协议的一般化构造方法。可以将这个一般化方法看作一个编译器,通过增加两轮的数据通信轮和一轮的数据验证轮,它可以将一个非认证的群密钥协商协议转化为一个可否认的群密钥协商协议。在协议轮数和计算量上并没有显著的增加,是一个高效的转化方式。在Random Oracle模型下给出了其安全证明和可否认性证明,一并给出的还有一个应用此编译器转化的具体实例。 A generic way to construct a deniable group key establishment protocol from an unauthenticated group key es-tablishment protocol was proposed.The construction could be seen as a compiler.By using Schnorr's zero-knowledge identification scheme,this compiler could transform an unauthenticated group key establishment to a deniable group key establishment protocol with only additional two round communications and one round verification.It is very efficient and practical.The security and deniability proof is in the Random Oracle model.A concrete transforming example of the con-struction was also presented.
出处 《通信学报》 EI CSCD 北大核心 2011年第3期143-149,共7页 Journal on Communications
基金 国家重点基础研究发展计划("973"计划)基金资助项目(2007CB311201) 国家高技术研究发展计划("863"计划)基金资助项目(2006AA01Z427) 国家自然科学基金资助项目(60673073 60970153)~~
关键词 群密钥协商 可否认性 一般化构造方式 group key establishment deniability generic construction
  • 相关文献

参考文献16

  • 1AIELLO W, BELLOVIN S M, BLAZE M, et al. Just fast keying: key agreement in a hostile internet[J]. ACM Transactions on Information and System Security, 2004, 7(2): 1-30.
  • 2KAUFMAN C. Internet key exchange (IKEv2) protocol[EB/OL]. http://www.iet f.org/rfc/rfc4306.txt.2005.
  • 3KRAWCZYK H. SIGMA: the 'SIGn-and-MAc' approach to authenticated Diffie-Hellman and its use in the 1KE protocols[A]. Cryptology-CRYPTO 2003[C]. 2003. 400-425.
  • 4MAO W, PATERSON K G. On the plausible deniability feature of Internet protocols[EB/OL], http://isg.rhul.ac.uk/-kp/IKE.ps.
  • 5BOYD C, MAO W, PATERSON K G. Deniable authenticated key establishment for Internet protocols[A]. Security Protocols-1 lth International Workshop[C]. 2003.255-271.
  • 6CANETI'I R, KRAWCZYK H. Analysis of key-exchange protocols and their use for building secure channels[A]. Cryptology-EUROCRYPT 2001 [C].2001. 453-474.
  • 7BRESSON E, MANUL1S M, SCHWENK J. On security models and compilers for group key exchange protocols[A]. Proc of IWSEC 2007[C]. 2007.292-307.
  • 8BRESSON E, MANULIS M. Malicious participants in group key exchange: key control and contributiveness in the shadow of trust[A]. ATC 2007[C].2007.395-409.
  • 9BRESSON E, MANULIS M. Contributory group key exchange in the presence of malicious participants[J], lET Inf Sec, 2008, 2(3): 85-93.
  • 10KANUKURTHI B, REYZIN L. Key agreement from close secrets over unsecured channels[A]. Cryptology- EUROCRYPT 2009[C]. 2009. 206- 223.

同被引文献14

  • 1孙海波,林东岱.基于零知识集的群组密钥分配方案[J].电子学报,2005,33(2):345-349. 被引量:4
  • 2WONG C K, GOUDA M, LAM S S. Secure group communications using key graphs[J]. IEEE Tran Networks, 2000, 8(8): 16-30.
  • 3WALLNER D M, HARDER E J, AGEE R C. Key management for multicast: issues and architectures[J]. Computer and Information Sci- ence, 1999, (7): 1-23.
  • 4WALDVOGEL M, CARONNI G; SUM D, et al.The versa key framework: versatile group key management [J]. IEEE Journal on Se- lected Areas in Communications (Special Issue on Middleware), 1999, 17(9):1614-1631.
  • 5SHEMAN A T, ACGREW D A. Key establishment in large dynamic groups using one-way function trees[J]. IEEE Transactions on Soft- ware Engineering, 2003, 29 (5): 444-458.
  • 6DINSMORE P T, BALENSON D M, HEYMAN M, et al. Pol- icy-based security management for large dynamic groups: an overview of the DCCM project[A]. Proc the DARPA Information Survivability Conference &Exposition[C]. SC, USA, 2000.64-73.
  • 7CHOU G H, CHEN W T. Secure broadcasting using the secure lock[J]. IEEE Trans on Software Engineering, 1989, 15(8): 929-934.
  • 8WANG T H, CHEN J L. Identity-based conference key broadcast systems[J]. IEEE Proc of Computers and Digital Techniques, 1994, 141(I): 57-60.
  • 9CHIKAZAWA T, YAMAG1SHI A. An improved identity-based one-way conference key sharing system[A]. Proc of ICCS/ISITA[C]. IEEE Computer Society Press, 1992. 270-273.
  • 10YANG Z K, XIE H T, CHEN W Q, et al. An identity-based fault-tolerant conference key distribution scheme[A]. The 7th Interna- tional and Conference on Parallel and Distributed Computing, Appli- cations and Technologies (PDCAT'06)[C]. 2006. 389-392.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部