高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

基于对的组密钥协商协议及其分析

张华 陈智雄 肖国镇

张华, 陈智雄, 肖国镇. 基于对的组密钥协商协议及其分析[J]. 电子与信息学报, 2006, 28(2): 247-251.
引用本文: 张华, 陈智雄, 肖国镇. 基于对的组密钥协商协议及其分析[J]. 电子与信息学报, 2006, 28(2): 247-251.
Zhang Hua, Chen Zhi-xiong, Xiao Guo-zhen. A Pairing-Based Group Key Agreement Protocol and Its Analysis[J]. Journal of Electronics & Information Technology, 2006, 28(2): 247-251.
Citation: Zhang Hua, Chen Zhi-xiong, Xiao Guo-zhen. A Pairing-Based Group Key Agreement Protocol and Its Analysis[J]. Journal of Electronics & Information Technology, 2006, 28(2): 247-251.

基于对的组密钥协商协议及其分析

A Pairing-Based Group Key Agreement Protocol and Its Analysis

  • 摘要: 在Shim(2003)的基于证书的三方密钥协商协议的基础上提出了一个基于对的组密钥协商协议。通过在密钥生成函数中引入伪随机数,防止了未知密钥共享攻击(the unknown key-share attack)和已知密钥攻击。给出了当前文献中已知的一些攻击方法,并证明这些攻击方法在此协议中是无效的。同时此协议具有前向安全和后向安全的特性,即在动态组的情况下协议仍是安全的。
  • Bresson E, Chevassut O, Pointcheval D. Provably authenticated group Diffie-Hellman key exchange- the dynamic case, In C.Boyd, editor, Advances in Crytology-Proceedings of AsiaCrypt 2001, Springer-Verlag LNCS Vo1.2248, 2001: 290一309.[2]Pereira O. Modelling and security analysis of authenticated group key agreement protocols, PhD thesis. Universite Catholique de Louvain, 2003[3]Joux A. A one-round protocol for tripartite Dittie-Hellman,Algorithm Number Theory Symposium一ANTS-IV, Lecture Notes in Computer Science, 1838, Springer-Verlag, 2000:385一394.[4]Shim K. Efficient one-round tripartite authenticated key agreement protocol from the Weil pairing. Electronics Letters 2003, (39): 208一209.[5]Ateniese Giuseppe, Steiner Michael, Tsudik Gene. New multiparty authentication services and key agreement protocols.IEEE J on Selected Areas in Communications, 2000, 18(4).[6]Michael Steiner, Gene Tsudik, Michael Waidner. Key agreement in dynamic peer Groups[J].IEEE Trans. on Parallel and Distributed Systems.2000, 11(8):769-[7]Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology一Crypto' 2001, Lecture Notes in Computer Science Vo1.2139, Springer-Verlag, 2001: 213一229.[8]AI-Riyami S S, Paterson K Q Tripartite; authenticated key agreement protocols from pairings. IIVIA Conference on Cryptography and Coding, Lecture Notes in Computer Science 2898, Springer-Verlag, 2003: 332一359.[9]Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. the Sixth IMA International Conference on Cryptography and Coding, Cirencester, England,1997: 30一45.[10]Boneh D, Silverberg A. Applications of multilinear forms to cryptography, Contemporary Mathematics 324, American Mathematical Society, 2003: 71一90.[11]Chao-Wen Chan, Chin-Chen Chang. Key exchange protocols for multiparty communication services. Proceedings of the First International Symposium on Cyber Worlds (CW.02), IEEE, 2002:241一248.
  • 加载中
计量
  • 文章访问数:  2370
  • HTML全文浏览量:  122
  • PDF下载量:  638
  • 被引次数: 0
出版历程
  • 收稿日期:  2004-07-12
  • 修回日期:  2005-01-08
  • 刊出日期:  2006-02-19

目录

    /

    返回文章
    返回