高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

层次身份基认证密钥协商方案的安全性分析和改进

毛可飞 陈杰 刘建伟

毛可飞, 陈杰, 刘建伟. 层次身份基认证密钥协商方案的安全性分析和改进[J]. 电子与信息学报, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
引用本文: 毛可飞, 陈杰, 刘建伟. 层次身份基认证密钥协商方案的安全性分析和改进[J]. 电子与信息学报, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
Citation: MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443

层次身份基认证密钥协商方案的安全性分析和改进

doi: 10.11999/JEIT151443
基金项目: 

国家自然科学基金(61272501),国家重点基础研究发展计划(2012CB315905)

Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme

Funds: 

The National Natural Science Foundation of China (61272501), The National Key Basic Research Program of Ching (2012CB315905)

  • 摘要: 该文分析了曹晨磊等人(2014)提出的层次身份基认证密钥协商方案的安全性,指出该方案无法抵抗基本假冒攻击。文中具体描述了对该方案实施基本假冒攻击的过程,分析了原安全性证明的疏漏和方案无法抵抗该攻击的原因。然后,在BONEH等人(2005)层次身份基加密方案基础上提出了一种改进方案。最后,在BJM模型中,给出了所提方案的安全性证明。复杂度分析表明所提方案在效率上同原方案基本相当。
  • BONEH D and FRANKLIN M. Identity-based encryption from the Weil pairing[C]. Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 2001: 213-229.
    SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Proceedings of 4rd Annual International Cryptology Conference, Santa Barbara, California, USA, 1984: 47-53.
    夏松, 权建校, 韩文报. 不同PKG环境下可证安全的基于身份AKA协议[J]. 电子与信息学报, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.
    XIA S, QUAN J, and HAN W. Provably secure identity-based authenticated key agreement protocols in multiple PKG environment[J]. Journal of Electronics Information Technology, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.
    曹雪菲, 寇卫东, 樊凯, 等. 无双线性对的基于身份的认证密钥协商协议[J]. 电子与信息学报, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.
    CAO X, KOU W, Fan K, et al. An identity-based authenticated key agreement protocol without bilinear pairing[J]. Journal of Electronics Information Technology, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.
    HORWITZ J and LYNN B. Toward hierarchical identity-based encryption[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Netherland, 2002: 466-481.
    GENTRY C and SILVERBERG A. Hierarchical ID-based cryptography[C]. Proceedings of 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 548-566.
    BONEH D, BOYEN X, and GOH E. Hierarchical identity based encryption with constant size ciphertext[C]. Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 440-456.
    GUO H, MU Y, LI Z, et al. An efficient and non-interactive hierarchical key agreement protocol[J]. Computers Security, 2011, 30(1): 28-34.
    曹晨磊, 刘明奇, 张茹, 等. 基于层级化身份的可证明安全的认证密钥协商协议[J]. 电子与信息学报, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.
    CAO C, LIU M, ZHANG R, et al. Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.
    IBRIQ J and MAHGOUB I. HIKES: hierarchical key establishment scheme for wireless sensor networks[J]. International Journal of Communication Systems, 2014, 27(10): 1825-1856.
    KIM H. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS[J]. Sensors, 2014, 14(12): 23742-23757. doi: 10.3390/s141223742.
    GOLDWASSER S and MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
    BELLARE M and PHILLIP R. Random oracles are practical: a paradigm for designing efficient protocols[C]. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 1993: 62-73.
    BELLARE M and PHILLIP R. Entity authentication and key distribution[C]. Proceedings of 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 1993: 232-249.
    BLAKE-WILSON S, JOHNSON D, and MENEZES A. Key agreement protocols and their security analysis[C]. Proceedings of 6th IMA International Conference, Cirencester, UK, 2005: 30-45.
    LAMACCHIA B, LAUTER K, and MITYAGIN A. Stronger security of authenticated key exchange[C]. Proceedings of First International Conference ProvSec, Wollongong, Australia, 2007: 1-16.
    CHEN L, CHENG Z, and SMART N. Identity-based key agreement protocols from pairings[J]. International Journal of Information Security, 2007, 6(4): 213-241.
    倪亮, 陈恭亮, 李建华. eCK模型的安全性分析[J]. 山东大学学报(理学版), 2013, 48(7): 46-48.
    NI L, CHEN G, and LI J. Security analysis of the eCK model[J]. Journal of Shandong University (Natural Science), 2013, 48(7): 46-48.
    FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]. Proceedings of 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 2012: 467-484.
    BONEH D and BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 223-238.
    ZHU G, XIONG H, and QIN Z. On the security of an efficient and non-interactive hierarchical key agreement protocol[J]. Wireless Personal Communications, 2014, 74(2): 883-889.
    魏江宏, 刘文芬, 胡学先. 标准模型下可证安全的属性基认证密钥交换协议[J]. 软件学报, 2014, 25(10): 2397-2408.
    WEI J, LIU W, and HU X. Provable secure attribute based authenticated key exchange protocols in the standard model[J]. Journal of Software, 2014, 25(10): 2397-2408.
    DENG H, WU Q, QIN B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J]. Information Sciences, 2014, 275: 370-384.
    LYNN B. On the implementation of pairing-based cryptosystems[D]. [Ph.D. dissertation], Stanford University, 2007.
  • 加载中
计量
  • 文章访问数:  1311
  • HTML全文浏览量:  170
  • PDF下载量:  386
  • 被引次数: 0
出版历程
  • 收稿日期:  2015-12-22
  • 修回日期:  2016-05-16
  • 刊出日期:  2016-10-19

目录

    /

    返回文章
    返回