基于身份认证密钥协商的分析与改进
DOI: 10.3969/j.issn.1006-7043.2009.10.021
Keywords: 公钥密码 基于身份的认证密钥协商 双线性对 标准模型 public key cryptography identity-based authenticated key agreement bilinear maps standard model
Abstract:
针对标准模型下可证明安全的基于身份认证密钥协商协议给出了一种有效攻击,指出其无会话密钥托管的协议存在安全缺陷.当密钥生成器(PKG)被恶意控制时,协商的会话密钥仍能被计算出来.为了抵抗这种攻击,给出了一种改进的基于身份认证密钥协商协议. 改进的协议在标准模型下是可证明安全的,具有无会话密钥托管的属性.
References
[1] | 1. SHAMIR A Identity-based cryptosystems and signature schemes 1984
|
[2] | ?2. BONEH D.FRANKLIN M Identity-based encryption from the Weil pairings 2001
|
[3] | 3. SMART N P ID-based authenticated key agreement protocol based on the Weil pairings 2002(13)
|
[4] | 4. SCOTT M Authenticated ID-based key exchange and remote log-in with insecure token and PIN number 2002
|
[5] | 5. CHEN L.KUDLA C Identity based authenticated key agreement from pairings 2005(10)
|
[6] | ?6. SHIM K Efficient ID-based authenticated key agreement protocol based on the Weil pairing 2003(8)
|
[7] | 7. SUN H M.HSIEH B T Security analysis of Shim’s authenticated key agreement protocols from pairings 2003
|
[8] | 8. McCULLAGH N.BARRETO P A new two-party identity-based authenticated key agreement 2005
|
[9] | 9. XIE G Cryptanalysis of Noel McCullagh and Paulo S.L.M.Barreto’s two-party identity-based key agreement 2004
|
[10] | ?10. CHOO K Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement protocols 2004
|
[11] | 11. BELLARE M.ROGAWAY P Random oracles are practical:a paradigm for designing efficient protocols 1993
|
[12] | 12. CANETTI R.GOLDREICH O.HALEVI S The random oracle methodology,revisited 2004(4)
|
[13] | 13. GENTRY C Practical identity-based encryption without random oracles 2006
|
[14] | ?14. 王圣宝.曹珍富.董晓蕾 标准模型下可证安全的身份基认证密钥协商协议 2007(10)
|
[15] | ?15. MENCZES A J.OORSCHOT P C.VANSTONE S Handbook of applied cryptography 1997
|
[16] | ?16. BELLARE M.ROGAWAY P Entity authentication and key distribution 1994
|
[17] | 17. CHEN L.CHENG Z.SMART N P Identity-based key agreement protocols from pairings 2007(4)
|
Full-Text