高级搜索

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

标准模型下增强的基于身份的认证密钥协商协议

任勇军 王建东 庄毅

任勇军, 王建东, 庄毅. 标准模型下增强的基于身份的认证密钥协商协议[J]. 电子与信息学报, 2009, 31(8): 1990-1995. doi: 10.3724/SP.J.1146.2008.01202
引用本文: 任勇军, 王建东, 庄毅. 标准模型下增强的基于身份的认证密钥协商协议[J]. 电子与信息学报, 2009, 31(8): 1990-1995. doi: 10.3724/SP.J.1146.2008.01202
Ren Yong-jun, Wang Jian-dong, Zhuang Yi. Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Electronics & Information Technology, 2009, 31(8): 1990-1995. doi: 10.3724/SP.J.1146.2008.01202
Citation: Ren Yong-jun, Wang Jian-dong, Zhuang Yi. Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Electronics & Information Technology, 2009, 31(8): 1990-1995. doi: 10.3724/SP.J.1146.2008.01202

标准模型下增强的基于身份的认证密钥协商协议

doi: 10.3724/SP.J.1146.2008.01202
基金项目: 

国家863计划项目(2006AA706103)和国家部委科研项目(C0720061360)资助课题

Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model

  • 摘要: 密钥抽取是密钥协商协议的一个重要环节,该文指出2007年王圣宝等人提出的标准模型下基于身份的认证密钥协商协议在该环节存在重要缺陷;并根据密钥抽取函数的不同功能,将标准模型下密钥抽取细化为随机提取和密钥抽取两个步骤,并基于Kiltz等人提出的基于身份的加密方案,设计了一个新的认证密钥协商协议IBAKE,其安全性证明规约更严谨,协议执行效率更高。
  • Wang Sheng-bao, Cao Zhen-fu, and Dong Xiao-lei. Provablysecure identity-based authenticated key agreement protocolsin the standard model[J]. Chinese Journal of Computers,2007, 30(10): 1842-1852.[2]Smart N. An ID-based authenticated key agreement protocolbased on the Weil pairing[J].Electronic Letters.2002, 38(13):630-632[3]Jin Li-jie and Xu Chun-xiang. An identity basedauthenticated key agreement protocol[J]. InformationSecurity and Communications Privacy, 2007, 16(8): 20-22.[4]Wang Li-min and Li Yi-fa. Research of identity-based keyagreement protocols[J]. Application Research of Computers,2007, 24(9): 93-95.[5]Sun Ji-min, Sun Yu, Zhang Si-dong, and Pei Qing-qi.Identity(ID)-based authentication and the key agreementprotocol[J]. Journal of Xidian University, 2008, 35(3):559-562.[6]Cao Tian-jie and Lei Hong. Privacy-enhancing authenticatedkey agreement protocols based on elliptic curvecryptosystem[J]. Acta Electronica Sinica, 2008, 36(2):397-401.[7]Chen L, Cheng Z, and Smart N P. Identity-based keyagreement protocols from pairings[J].International Journalof Information Security.2007, 6(4):213-241[8]Chevassut O, Fouque P A, Gaudry P, and Pointcheval D. Keyderivation and randomness extraction.Cryptology ePrintArchive, Report 2005/061.[9]Gentry C. Practical identity-based encryption withoutrandom oracles[C][J].In Proceedings of EURO-CRYPT0.2006, LNCS 4004:445-464[10]Eike Kiltz and Yevgeniy Vahlis. CCA2 Secure IBE: StandardModel Efficiency through Authenticated SymmetricEncryption[C][J].In Proceedings of CT-RSA0.2008, LNCS4964:221-239[11]Krawczyk H. HMQV: A high-performance secure diffiehellmanprotocol[C][J].Advances in Cryptology- CRYPTO0.2005, LNCS 3621:546-566[12]Bellare M and Rogaway P. Entity authentication and keydistribution[C][J].In Proceedings of CRYPTO9.1994, LNCS773:110-125[13]Canetti R and Krawczyk H. Analysis of key-exchangeprotocols and their use for building secure channels. InAdvances in Cryptology-EUROCRYPT 2001 Proceeding,Berlin: Springer-Verlag, 2001: 453-474.[14]Choo K K, Boyd C, and Hitchcock Y. Examiningindistinguishability-based proof models for key establishmentprotocols. Advances in Cryptology ASIACRYPT 2005, 2005,LNCS 3788: 585-604.[15]Dent A W. A note on game-hopping proofs. CryptologyePrint Archive, Report 2006/260.[16]Park DongGook , Boyd Colin, and Moon Sang-Jae. Forwardsecrecy and its application to future mobile communicationssecurity[C][J].In Proceedings of PKC200.2000, LNCS 1751:433-445
  • 加载中
计量
  • 文章访问数:  3653
  • HTML全文浏览量:  98
  • PDF下载量:  914
  • 被引次数: 0
出版历程
  • 收稿日期:  2008-09-22
  • 修回日期:  2009-03-10
  • 刊出日期:  2009-08-19

目录

    /

    返回文章
    返回