期刊文献+

移动自组网中跨域两方认证密钥协商协议研究 被引量:7

Research on authenticated key agreement protocol in cross-domain two-party for mobile Ad hoc network
在线阅读 下载PDF
导出
摘要 针对基于身份的移动自组网认证密钥协商协议中,会话两方属于不同私钥生成中心(PKG)的情况,利用双线性对的性质和椭圆曲线离散对数问题,提出了一种跨域两方认证密钥协商协议,并采用应用pi演算和ProVerif自动化验证工具对其安全属性进行形式化分析。分析结果表明,提出的协议实现了保密性、身份认证性以及密钥一致性确认,同时又具有较好的性能,非常适用于资源有限的移动自组网。 In order to resolve the problems of ID-based authenticated key agreement protocol that two session parties belong to different private key generators(PKG) in mobile Ad hoc network(MANET) respectively,this paper proposed an authenticated key agreement protocol for cross-domain two session parties based on the bilinear pairing and elliptic curve discrete logarithm problem.The secure properties of the protocol had been formally verified in the applied pi calculus with the assistance of an automatic protocol verifier.All analysis show that the scheme perfectly adapt to the resource limited MANET because of its better secure property of secrecy,identity authenticity and the same key confirmation as well as better performance.
机构地区 西安通信学院 [
出处 《计算机应用研究》 CSCD 北大核心 2011年第7期2734-2737,共4页 Application Research of Computers
关键词 认证 密钥协商 双线性对 跨域 移动自组网 authentication key agreement bilinear pairing cross-domain MANET
  • 相关文献

参考文献13

二级参考文献47

  • 1孙鹏,黄鑫,庄雷.认证技术在P2P网络中的应用研究[J].计算机应用与软件,2005,22(6):115-118. 被引量:12
  • 2彭双和,韩臻,沈昌祥.安全域间信息资源访问的协议和方法[J].计算机研究与发展,2005,42(9):1587-1593. 被引量:7
  • 3王鹏,王琳,祝跃飞.在P2P网络下Sybil攻击的研究与防范[J].微电子学与计算机,2006,23(4):162-165. 被引量:5
  • 4路晓明,冯登国.一种基于身份的多信任域网格认证模型[J].电子学报,2006,34(4):577-582. 被引量:32
  • 5彭华熹.一种基于身份的多信任域认证模型[J].计算机学报,2006,29(8):1271-1281. 被引量:57
  • 6Divac - Krnic L, Ackemann R. Sccure - related issues in peer - to - peer networks[ M]//In. P2P Systems and Applica- tions, Lecture Notes on Computer Science 3485. Berlin: Springer - Verlag, 2005 : 529 - 545.
  • 7Dinger J, Hartenstein H. Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self- Registration[C]//Proceedings of the First International Conference on Availability, Reliability and Security (ARES'06) . [s. l. ] :IEEE Computer Society Press,2006.
  • 8李芸波.P2P下认证授权体系的研究[D].昆明:昆明理工大学,2007.
  • 9Gomntla M C,Saxena A. An Efficient Certificateless Signature Schenle[ C]//In: Advances in Computer Science - ASIAN 2006, Lecture Notes in Computer Science 4435,2008,37 - 44. Proc of CIS'05. Berfin:Springer-Verlag,2005: 110- 116.
  • 10Wang Changji, Huang Hui. An Efficient Certificateless Signature from Pairings [ C ]//In: Data, Privacy, and E - Commerce, 2007. ISDPE 2007. [s.l. ] : IEEE Computer Society, 2007: 236 - 238.

共引文献81

同被引文献54

  • 1赵华伟,李大兴.密钥交换协议的安全性分析[J].山东大学学报(理学版),2006,41(4):101-106. 被引量:6
  • 2WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4Al-Riyami S S,Paterson K G.Certificateless public key cryptography[C]//ASIACRYPT’03.LNCS,2003,2894:452-473.
  • 5Mandt T K,Tan C H.Certificateless authenticated two party key agreement protocols[C]//ASIAN 2006.LNCS,2008,4435:37-44.
  • 6Wang S B,Cao Z F,Bao H Y.Efficient certificateless authentication and key agreement(CL-AK) for grid computing[J].International Journal of Network Security,2008,7(3):342-347.
  • 7Blanchet B,Abadi M,Fournet C.Automatic verification of selected equivalences for security protocols[J].Journal of Logic and Algebraic Programming,2008,75(1):3-51.
  • 8Blanchet B.Automatic verification of correspondences for security protocols[J].Journal of Computer Security,2009,17(4):363-434.
  • 9Chen L,Kudla C.Identity-based authenticated key agreement protocols from pairings [C]//Proceedings of the 16th IEEE Computer Security Foundations Workshop.2003:219-233.
  • 10Kim S,Lee H,Oh H.Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment [C]//ICICS 2005.LNCS,2005,3783:323-335.

引证文献7

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部