浏览全部资源
扫码关注微信
1. 广东财经大学 数学与统计学院,广东 广州 510320
2. 上海市信息安全综合管理技术研究重点实验室,上海 200240
3. 华南师范大学 计算机学院,广东 广州510631
4. 中国科学院 信息工程研究所 信息安全国家重点实验室,北京 100093
[ "温雅敏(1981-),女,江西赣州人,博士,广东财经大学副教授,主要研究方向为隐私保护密码学协议的设计与可证明安全。" ]
[ "龚征(1981-),男,江西南昌人,博士,华南师范大学副教授,主要研究方向为密码学与信息安全。" ]
网络出版日期:2015-09,
纸质出版日期:2015-09-25
移动端阅览
温雅敏, 龚征. 新型组织隐藏的认证密钥交换协议[J]. 通信学报, 2015,36(9):82-90.
Ya-min WEN, Zheng GONG. New affiliation-hiding authenticated key exchange protocol[J]. Journal on communications, 2015, 36(9): 82-90.
温雅敏, 龚征. 新型组织隐藏的认证密钥交换协议[J]. 通信学报, 2015,36(9):82-90. DOI: 10.11959/j.issn.1000-436x.2015246.
Ya-min WEN, Zheng GONG. New affiliation-hiding authenticated key exchange protocol[J]. Journal on communications, 2015, 36(9): 82-90. DOI: 10.11959/j.issn.1000-436x.2015246.
提出了一个实现组织集合交集认证策略的新型组织隐藏的密钥协商协议,2个匿名用户从属的组织集合存在交集且元素个数至少为一个门限值时可以完成一次成功的秘密认证和密钥协商,同时保证集合交集之外的组织信息机密性。新协议在随机预言机模型下可证安全,并且在计算和通信性能上仍具备一定的优势。
A new affiliation-hiding authenticated key agreement protocol was proposed.The proposal enables two anonymous users to accomplish a successful secret authentication and key agreement when their groups set intersection is non-empty and the cardinality of the set intersection should not be less than a threshold value.Meanwhile
the affiliations of groups outside of the set intersection remain confidential.The proposal is provably secure under the random oracle model
and the performance of the scheme is still competitive.
JARECKI S , KIM J , TSUDIK G . Group secret handshakes or affilia-tion-hiding authenticated group key agreement [A ] . Proceeding of CT-RSA 2007 [C ] . San Francisco,CA,USA , 2007 . 287 - 308 .
JARECKI S , KIM J , TSUDIK G . Beyond secret handshakes:affilia-tion-hiding authenticated key exchange [A ] . Proceeding of CT-RSA 2008 [C ] . San Francisco,CA,USA , 2008 . 352 - 369 .
BALFANZ D , DURFEE G , SHANKAR N , et al . Secret handshakes from pairing-based key agreements [A ] . Proceeding of IEEE Sympo-sium on Security and Privacy[C].Berkeley,California,USA,IEEE Computer Society , 2003 . 180 - 196 .
CASTELLUCCIA C , JARECKI S , TSUDIK G . Secret handshakes from ca-oblivious encryption [A ] . Proceedings of ASIACRYPT 2004 [C ] . Jeju Island,Korea , 2005 . 293 - 307 .
ZHOU L , SUSILO W , MU Y . Three-round secret handshakes based on ElGamal and DSA [A ] . Proceedings of ISPEC 2006 [C ] . Hang-zhou,China , 2006 . 332 - 342 .
VERGNAUD D . RSA-based secret handshakes [A ] . Proceedings of International Workshop of Coding and Cryptography (WCC 2005) [C ] . Bergen,Norway , 2005 . 252 - 274 .
XU S H , YUNG M . K-anonymous secret handshakes with reusable credentials [A ] . Proceedings of ACM Conference on Computer and Communications Security (CCS 2004) [C ] . Washington DC,USA , 2004 . 158 - 167 .
JARECKI S , LIU X M . Unlinkable secret handshakes and key-private group key management schemes [A ] . Proceedings of ACNS 2007 [C ] . Zhuhai,China , 2007 . 270 - 287 .
WEN Y M , ZHANG F G , XU L L . Unlinkable secret handshakes from message recovery signature [J ] . Chinese Journal of Electronics , 2010 , 19 ( 4 ): 705 - 709 .
GU J , XUE Z . An improved efficient secret handshakes scheme with unlinkability [J ] . IEEE Communication Letters , 2011 , 15 ( 2 ): 259 - 261 .
ATENIESE G , BLANTON M , KIRSCH J . Secret handshakes with dynamic and fuzzy matching [A ] . Proceedings of Network and Distrib-uted System Security Symposium(NDSS 2007) [C ] . San Diego,Cali-fornia,USA , 2007 . 159 - 177 .
SORNIOTTI A , MOLVA R . Secret handshakes with revocation sup-port [A ] . Proceedings of ICISC 2009 [C ] . Seoul,Korea , 2009 . 274 - 299 .
SORNIOTTI A , MOLVA R . A provably secure secret handshake with dynamic controlled matching [J ] . Computers &Security , 2010 , 29 ( 5 ): 619 - 627 .
SORNIOTTI A , MOLVA R . Federated secret handshakes with support for revocation [A ] . Proceedings of ICICS 2010 [C ] . Barcelona,Spain , 2010 . 218 - 234 .
MANULIS M , PINKAS B , POETTERING B . Privacy-preserving group discovery with linear complexity [A ] . Proceedings of ACNS 2010 [C ] . Beijing,China , 2010 . 420 - 437 .
BRANDS S . An Efficient off-line Electronic Cash System Based on the Representation Problem [R ] . Technical Report CS-R9323,CWI (Centre for Mathematics and Computer Science) Amsterdam,the Netherlands , 1993 .
BELLARE M , CANETTI R , KRAWCZYK H . A modular approach to the design and analysis of authentication and key exchange protocols (Extended Abstract) [A ] . The ACM Symposium on Theory of Com-puting (STOC) [C ] . San Francisco,CA,USA , 1998 . 419 - 428 .
SCHNORR C . Efficient identification and signatures for smart cards [A ] . Proceeding of CRYPT0 1989 [C ] . Santa Barbara,CA,USA , 1989 . 239 - 252 .
POINTCHEVAL D , STERN J . Security proofs for signature schemes [A ] . Proceedings of EUROCRYPT 1996 [C ] . Saragossa,Spain , 1996 . 387 - 398 .
0
浏览量
1057
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构