全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

一种基于身份的可否认认证协议的改进

Keywords: 基于身份的加密,否认认证协议,非交互式

Full-Text   Cite this paper   Add to My Lib

Abstract:

为了满足非交互式的可否认认证协议的安全评估,将密钥泄漏(key-compromiseimpersonation,KCI)安全属性重新定义为发送方密钥泄漏(senderkey-compromiseimpersonation,SKCI)安全属性,并针对Cao方案存在的发送方密钥泄漏攻击问题,提出一种改进,该方案同原方案相比减少了6次对运算且通信双方的交互次数减少了2次.另外,与同类Liao的改进方案相比,本文方案不需要增加签名机制即可实现身份认证且同时满足可认证性、否认性和发送方密钥泄漏安全性.

References

[1]  DWORK C,NAOR M,SAHAI A.Concurrent zero-knowledge[J].Journal of the ACM,2004,51(6):851-898.
[2]  SHAO Z H.Efficient deniable authentication protocol based on generalized EIGamal signature scheme[J].ComputerStandards&Interfaces,2004,26(3):449-454.
[3]  LU R X,CAO Z F.A new deniable authentication protocol from bilinear pairings[J].Applied Mathematics and Computation,2005,168(2):954-961.
[4]  LU R X,CAO Z F.Non-interactive deniable authentication protocol based on factoring[J].Computer Standards&Interfaces,2005,27(4):401-405.
[5]  CAO T J,LIN D D,XUE R.An efficient ID-based deniable authentication protocol from pairings[C]∥The19th InternationalConference on Advanced Information Networking and Applications,Parimala Thulasiraman,March 28-30,2005:388-391.
[6]  LIAO I E,LEE C C,HWANG M S.Identity-based deniable authentication protocol from pairings[C]∥Proc of Internet andMultimedia Systems and Applications.UK:[s.n.],2006:112-114.
[7]  LIM M,LEE S,LEE H.Cryptanalysis on an enhanced identity-based deniable authentication protocol[C]∥The IEEEInternational Conference on Industrial Informatics(INDIN 2008).Korea:[s.n.],2008:581-585.
[8]  CHOU J S,CHEN Y L,HUANG J C.A ID-based deniable authentication protocol on pairings[R/OL].Cryptology ePrintArchive:335[2006-08-23].http:∥eprint.iacr.org/2006/335.pdf.
[9]  AUMANN Y,RABIN M.Efficient deniable authentication of long messages[C]∥Conf on Theoretical Computer Science inhonor of Professor Manuel Blum's 60th birthday,April 20-24,1998:20-24.
[10]  DENG X,LE C H,ZHU H.Deniable authentication protocols[J].IEE Proc-Comput Digit Tech,2001,148(2):101-104.
[11]  FAN L,XU C X,LI J H.Deniable authentication protocol based on Diffie-Hellman[J].Algorithm Electronics Letters,2002,38(4):705-706.
[12]  OKAMOTO T,TSO R,OKAMOTO E.One-way and two-party authenticated ID-based key agreement protocols using pairing[C]∥2nd International Conference-MDAI’05.Berlin:Springer-Verlag,2005:122-133.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133