全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于TPM的单向匿名认证密钥协商协议

Keywords: 模块可信平台,密钥协商协议,可信计算,匿名认证,知识证明,群系统

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了对密钥协商协议实现匿名认证,进而有效保护通信方身份秘密,提出了一种基于可信平台模块(trustedplatformmodule,TPM)的单向匿名认证密钥协商协议.该协议基于可信计算平台,引入TPM技术,不但实现了认证和密钥协商的安全属性要求,还满足了用户匿名的需求,使通信一方在不泄露其真实身份的前提下,向验证方证明其为某个群系统的合法成员,并在群管理员的配合下生成一个临时身份,提供了较好的安全性,适用于计算和存储资源有限的应用场合.

References

[1]  MENEZES A,van ORSCHOT P,VANSTONE S.Handbook of applied cryptography[M].New York:CRCPress,1996:425-460.
[2]  曹雪菲,寇卫东,樊凯,等.无双线性对的基于身份的密钥协商协议[J].电子与信息学报,2009,52(5):1241-1244.CAO Xue-fei,KOU Wei-dong,FAN Kai,et al.Anidentity-based authenticated key agreement protocol withoutbilinear pairing[J].Journal of Electronics&InformationTechnology,2009,52(5):1241-1244.(in Chinese)
[3]  舒剑,许春香.改进的基于身份认证密钥协商协议[J].计算机应用研究,2010,65(1):218-219SHU Jian,XU Chun-xiang.Improve ment of ID-basedauthenticated key exchange protocol[J].ApplicationResearch of Computers,2010,65(1):218-219.(inChinese)
[4]  任勇军,王建东,王箭,等.标准模型下基于身份认证密钥协商协议[J].计算机研究与发展,2010,47(9):1604-1610.REN Yong-jun,WANG Jian-dong,WANG Jian,et al.Identity-based authenticated key agreement protocols in thestandard model[J].Journal of Computer Research andDevelopment,2010,47(9):1604-1610.(in Chinese)
[5]  郭华,张帆,李舟军,等.对一个基于身份的密钥协商协议的分析与改进[J].计算机科学,2010,37(10):78-81.GUO Hua,ZHANG Fan,LI Zhou-jun,et al.Cryptanalysis and improvement of a new identity-based keyexchange protocol[J].Computer Science,2010,37(10):78-81.(in Chinese)
[6]  BOYD C,PARK D G.Public key protocols for wirelesscommunications[C]∥Proceedings of the ICISC 1998.Seoul:KIISC,1998:47-57.
[7]  SHOUP V.On formal models for secure key exchange[EB/OL].[2011-05-15].http:∥www.shoup.net/paper/skey.ps.
[8]  查俊,苏锦海,张学润.一个新的基于口令的密钥协商协议[J].计算机应用研究,2010,27(10):3885-3888.ZHA Jun,SU Jin-hai,ZHANG Xue-run.New keyagreement protocol based on passwords[J].ApplicationResearch of Comptuers,2010,27(10):3885-3888.(inChinese)
[9]  VIET D Q,YAMAMURA A,TANAKA H.Anonymouspassword-based authenticated key exchange[C]∥Proceedings of INDOCRYPT.Berlin:Springer-Verlag,2005:244-257.
[10]  CHAI Z C,CAO Z F,LU R X.Efficient password-basedauthentication and key exchange scheme preserving userprivacy[C]∥WASA 2006.Heidelberg:Springer-Verlag,2006:467-477.
[11]  CHOW S S M,CHOO K K R.Strongly-secure identity-based key agreement and anonymous extension[C]∥Proceedings of Information Security Conference(ISC2007).Berlin:Springer-Verlag,2007:203-220.
[12]  胡焰智,马大玮,田增山.一种匿名认证密钥协商协议[J].计算机应用研究,2009,26(8):3024-3027.HU Yan-zhi,MA Da-wei,TIAN Zeng-shan.Authenticated key agreement protocol with anonymity[J].Application Research of Computers,2009,26(8):3024-3027.(in Chinese)
[13]  冯登国,秦宇,汪丹,等.可信计算技术研究[J].计算机研究与发展,2011,48(8):1332-1349.FENG Deng-guo,QIN Yu,WANG Dan,et al.Researchon trusted computing technology[J].Journal of ComputerResearch and Development,2011,48(8):1332-1349.(in Chinese)
[14]  刘安战,韩玉民.可信平台模块数据保护能力测试与分析[J].计算机应用,2010,30(5):1243-1245.LIU An-zhan,HAN Yu-min.Test and analysis of trustedplatform module data protection[J].Journal of ComputerApplication,2010,30(5):1243-1245.(in Chinese)

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133