全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
电子学报  2015 

标准模型下可托管的基于身份认证密钥协商

DOI: 10.3969/j.issn.0372-2112.2015.10.012, PP. 1954-1962

Keywords: 认证密钥协商,基于身份密码体制,双线性映射,标准模型,密钥托管

Full-Text   Cite this paper   Add to My Lib

Abstract:

现有会话密钥可托管的ID-AKA(IDentity-basedAuthenticatedKeyAgreement)协议要么存在已知安全缺陷,要么是在随机预言模型下可证明安全.基于Boneh等人定义的安全陷门函数,提出一种会话密钥可托管的ID-AKA协议.在ID-BJM模型基础上,扩展定义了ID-AKA协议分析的标准安全模型.扩展模型将安全游戏划分为两个阶段,去除了随机预言机,能完备地模拟不同类型敌手的行为.在扩展模型下,新协议的安全性被规约为多项式时间敌手求解判定性BDH(BilinearDiffie-Hellman)难题和判定性BDHI(BilinearDiffie-HellmanInversion)难题,具有可证明安全性.

References

[1]  Boneh D,Franklin M.Identity-based encryption from the weil pairing[A].Proceedings of the CRYPTO (LNCS 2139)[C].Berlin:Springer,2001.213-229.
[2]  钟欢,许春香.基于身份的多方认证组密钥协商协议[J].电子学报,2008,36(10):1869-1872. Zong Huan,Xu Chun-xiang.ID-basedmulti-party authenticated key agreement protocols using multilinear forms[J].Acta Electronica Sinica,2008,36(10):1869-1872.(in Chinese)
[3]  王竹,戴一奇,叶顶锋.普适安全的基于身份的签名机制[J].电子学报,2011,39(7):1613-1617. Wang Zhu,Dai Yi-qi,Ye Ding-feng.Universally composable identity-based signature[J].Acta Electronica Sinica,2011,39(7):1613-1617.(in Chinese)
[4]  高志刚,冯登国.高效的标准模型下基于身份认证密钥协商协议[J].软件学报,2011,22(5):1031-1040. Gao Zhi-Gang,Feng Deng-Guo.Efficientidentity-based authenticated key agreement protocol in the standard model[J].Journal of Software,2011,22(5):1031-1040.(in Chinese)
[5]  汪小芬,陈原,肖国镇.基于身份的认证密钥协商协议的安全分析与改进[J].通信学报,2008,29(12):16-21. Wang Xiao-Fen,Chen Yuan,Xiao Guo-Zhen.Analysis and improvement of an ID-based authenticated key agreement protocol[J].Journal on Communications,2008,29(12):16-21.(in Chinese)
[6]  高海英.可证明安全的基于身份的认证密钥协商协议[J].计算机研究与发展,2012,49(8):1685-1689. Gao Hai-ying.Provable secure ID-based authenticated key agreement protocol[J].Journal of Computer Research and Development,2012,49(8):1685-1689.(in Chinese)
[7]  陈明.标准模型下增强的身份基认证密钥协商[J].计算机应用研究,2014,31(6):1869-1873. Chen Ming.Extended identity-based authenticated key agreement in standard model[J].Application Research of Computers,2014,31(6):1869-1873.(in Chinese)
[8]  任勇军,王建东,王箭,徐大专,庄毅.标准模型下基于身份的认证密钥协商协议[J].计算机研究与发展,2010,47(9):1604-1610. Ren Yong-jun,Wang Jian-dong,Wang Jian,Xu Da-zhuan,Zhuang Yi.Identity-based authenticated key agreement protocol in the standard model[J].Journal of Computer Research and Development,2010,47(9):1604-1610.(in Chinese)
[9]  LaMacchia BA,Lauter K,Mityagin A.Stronger security of authenticated key exchange[A].Proceedings of the 1st International Conference on Provable Security (LNCS 4784)[C].Berlin:Springer,2007.1-16.
[10]  Boneh D,Boyen X.Efficient selective identity-based encryption without random oracles[J].Journal of Cryptology,2011,24(4):659-693.
[11]  明洋,王育民.标准模型下可证安全的通配符基于身份加密方案[J].电子学报,2013,41(10):2082-2086. Ming Yang,Wang Yu-min.Provably secure identity-based encryption scheme with wildcard in the standard model[J].Acta Electronica Sinica,2013,41(10):2082-2086.(in Chinese)
[12]  Shim K.Efficient ID-based authenticated key agreement protocol based on the Weil pairing[J].Electronics Letters,2003,39(8):653-654.
[13]  Chen L,Cheng Z,Smart N.Identity-based key agreement protocols from pairings[J].International Journal of Information Security,2007,6(4):213-241.
[14]  Chow S,Choo K-KR.Strongly-secure identity-based key agreement and anonymous extension[A].Proceedings of the ISC (LNCS 4779)[C].Berlin:Springer,2007.203-220.
[15]  Wang SB,Cao ZF,Cheng ZH,Choo K-KR.Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode[J].Science in China Series F:Information Sciences,2009,52(8):1358-1370.
[16]  Huang H,Cao Z.An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem[A].Proceedings of the ACM ASIACCS[C].New York:ACM,2009.333-342.
[17]  Fujioka A,Hoshino F,Kobayashi T,et al.Id-eCK secure ID-based authenticated key exchange on symmetric and asymmetric pairing[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2013,96(6):1139-1155.
[18]  Pandit T,Barua R,Tripathy S.ECK secure single round ID-based authenticated key exchange protocols with master perfect forward secrecy[A].Proceedings of the 8th International Conference on Network and System Security (LNCS 8792)[C].Berlin:Springer,2014.435-447.
[19]  Ni L,Chen GL,Li JH.Escrowable identity-based authenticated key agreement protocol with strong security[J].Computers & Mathematics with Applications,2013,65(9):1339-1349.
[20]  王圣宝,曹珍富,董晓蕾.标准模型下可证安全的身份基认证密钥协商协议[J].计算机学报,2007,30(10):1842-1852. Wang Sheng-Bao,Cao Zhen-Fu,Dong Xiao-Lei.Provably secure identity-based authenticated key agreement protocols in the standard model[J].Chinese Journal of Computers,2007,30(10):1842-1854.(in Chinese)

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133