期刊文献+

无双线性对的无证书两方认证密钥协商协议 被引量:4

Certificateless-based two-party authenticated key agreement protocol
在线阅读 下载PDF
导出
摘要 鉴于双线性对运算复杂度较高,不适用于移动通信环境,提出新的无双线性对的基于无证书的两方认证密钥协商协议。新协议解决了基于身份的公钥密码方案中固有的密钥托管问题,实现了对通信双方的身份认证,采用非双线性对运算,极大地降低了计算开销。通过分析协议的正确性,采用Applied Pi演算对协议进行形式化分析,借助ProVerif工具验证了协议的安全性和认证性。与其他两方密钥协商协议相比,新方案具有更好的安全性和效率。 Because of the high computational cost,bilinear pairing isn't equal to mobile communication environment.This paper proposed new certificateless-based two-party authenticated key agreement protocol without bilinear pairing.The agreement protocol solved the key escrow issues inherited in the identity-based schemes effectively and achieved identity authentication.And the computational cost decreased effectively without bilinear pairing.After confirming the correctness,the formal analysis based on Applied Pi calculus and ProVerif has shown fulfilled authentication and secure.Compared with other two-party authenticated key agreement protocols,the new proposed key agreement protocol has better security and efficiency.
机构地区 西安通信学院
出处 《计算机应用研究》 CSCD 北大核心 2012年第6期2240-2242,2267,共4页 Application Research of Computers
关键词 密钥协商 无证书密码体制 无双线性对 Applied PI演算 形式化分析 key agreement certificateless-based without bilinear pairing Applied Pi calculus formal analysis
  • 相关文献

参考文献10

二级参考文献93

共引文献61

同被引文献36

  • 1杨庚,余晓捷,王江涛,程宏兵.基于IBE算法的无线传感器网络加密方法研究[J].南京邮电大学学报(自然科学版),2007,27(4):1-7. 被引量:8
  • 2程宏兵,费国臻.基于身份的无线传感器网络密钥系统[J].计算机科学,2007,34(10):116-119. 被引量:4
  • 3A1-Riyami S S,Paterson K. Certificateless Public Key Cryptog- raphy[C] // Advances in Cryptology-ASIACRYPT' 03. Berlin: Springer-Verlag, 2003 : 452-473.
  • 4Mokhtarnameh R, Ho S B, Muthuvelu N. An Enhanced Certifi- catelss Authenticated Key Agreement Protocol[C] //Proc. of 13th International Conference on Advanced Communication Technology. Piscataway, NJ, USA: IEEE Press, 2011 : 802-806.
  • 5Mandt T K. Certificateless authenticated two-party key agree- ment protocol [D]. Oppland Gjovik University College, 2006.
  • 6Gao Meng, Zhang Fu-tai. Key-compromise Impersonation At- tacks on Some Certificateless Key Agreement Protocols and Two Improved Protocols [C] // Proc. of the Ist International Workshop on Education Technology and Computer Science. Wu- ban, China, 2009 : 62-66.
  • 7Boneh D,Franklin M.Identity-based Encryption From the Weil Pairings[C]//Lecture Notes in Computer Science,2001,2139:213-229.
  • 8Waters B.Efficient Identity-based Encryption Without Random Oracles[C]//Eurocrypt 2005,LNCS,3494:114-127.
  • 9Boneh D,Boyen X.Efficient identity-based encryption without Random Oracles[J].Journal of Cryptology,2011,24(4):659-693.
  • 10Yussoff Y M,Hashim H,Baba M D.Analysis of trusted identity-based encryption protocol for wireless sensor networks[C]//Control and System Graduate Research Colloquium(ICSGRC),2012:313-317.

引证文献4

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部