浏览全部资源
扫码关注微信
北京航空航天大学电子信息工程学院,北京 100191
[ "苏航(1992-),男,安徽宿州人,北京航空航天大学硕士生,主要研究方向为空间网络安全、密码学。" ]
[ "刘建伟(1964-),男,山东莱州人,博士,北京航空航天大学教授、博士生导师,主要研究方向为密码学、网络与信息安全。" ]
[ "陶芮(1991-),女,天津人,北京航空航天大学硕士生,主要研究方向为密码学、网络与信息安全。" ]
网络出版日期:2016-07,
纸质出版日期:2016-07-25
移动端阅览
苏航, 刘建伟, 陶芮. 无证书的层次认证密钥协商协议[J]. 通信学报, 2016,37(7):161-171.
Hang SU, Jian-wei LIU, Rui TAO. Hierarchical certificateless authenticated key agreement protocol[J]. Journal of communications, 2016, 37(7): 161-171.
苏航, 刘建伟, 陶芮. 无证书的层次认证密钥协商协议[J]. 通信学报, 2016,37(7):161-171. DOI: 10.11959/j.issn.1000-436x.2016145.
Hang SU, Jian-wei LIU, Rui TAO. Hierarchical certificateless authenticated key agreement protocol[J]. Journal of communications, 2016, 37(7): 161-171. DOI: 10.11959/j.issn.1000-436x.2016145.
提出了一种无证书的层次认证密钥协商协议,协议的安全性基于计算性 Diffie-Hellman 困难假设,并在eCK(extended Canetti–Krawczyk)模型下证明了该协议的安全性。该协议中,根PKG为多层的域PKG验证身份并生成部分私钥,域 PKG 为用户验证身份并生成部分私钥,私钥则由用户选定的秘密值和部分私钥共同生成。与已有协议相比,协议不含双线性映射配对运算,且具有较高的效率。
A hierarchical certificateless authenticated key agreement protocol was proposed
and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model
the security of the protocol was based on the computa-tional Diffie-Hellman assumption. In the protocol
a root PKG authenticates the identity and generates a partial private key for lower-level PKG which authenticate the identity and generate a partial private key for users
private key generated by partial private key and user selected secret value. Comparing with the existing protocols
the protocol is efficient without bilinear pairings computation.
HUNT R . PKI and digital certification infrastructure [C ] // Ninth IEEE International Conference on Networks .IEEE, c 2001 : 234 - 239 .
SHAMIR A . Identity based cryptosystems and signature schemes [C ] // Advances in Cryptology Crypto84 .Berlin:Springer-Verlag, c 1984 : 47 - 53 .
AL-RIYAMI S S , PATERSON K G . Certificateless public key cryp-tography [M ] . Advances in Cryptology-ASIACRYPT 2003 ,Springer Berlin Heidelberg, 2003 : 452 - 473 .
HE D , CHEN Y , CHEN J , et al . A new two-round certificateless au-thenticated key agreement protocol without bilinear pairings [J ] . Mathematical and Computer Modelling , 2011 , 54 ( 11 ): 3143 - 3152 .
HE D , CHEN J , HU J . A pairing‐free certificateless authenticated key agreement protocol [J ] . International Journal of Communication Systems , 2012 , 25 ( 2 ): 221 - 230 .
HE D , PADHYE S , CHEN J . An efficient certificateless two-party authenticated key agreement protocol [J ] . Computers & Mathematics with Applications , 2012 , 64 ( 6 ): 1914 - 1926 .
TONG D , LIU J W , MAO K F , et al . Certificateless and pairing-free key agreement scheme for satellite network C ] // Communications Security Conference (CSC 2014) .IET, c 2014 : 1 - 5 .
MOHAMED N A F , HASHIM M H A , BASHIER E , et al . Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol C ] // 2012 World Congress on Internet Security (WorldCIS) ,IEEE, c 2012 : 167 - 172 .
SUN H Y , WEN Q Y , ZHANG H , et al . A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices [J ] . Information Technology and Control , 2013 , 42 ( 2 ): 191 - 204 .
GHOREISHI S M , ABD R S , ISNIN I F , et al . New secure iden-tity-based and certificateless authenticated key agreement protocols without pairings C ] // 2014 International Symposium on Biometrics and Security Technologies (ISBAST) .IEEE, c 2014 : 188 - 192 .
WANG Z , DU X , SUN Y . Group key management scheme based on proxy re-cryptography for near-space network C ] // 2011 International Conference on Network Computing and Information Security (NCIS) .IEEE, c 2011 , 1 : 52 - 56 .
GENTRY C , SILVERBERG A . Hierarchical ID-based cryptography [M ] . Advances in cryptology—ASIACRYPT2002 ,Springer Berlin Heidelberg, 2002 : 548 - 566 .
曹晨磊 , 刘明奇 , 张茹 , 等 . 基于层级化身份的可证明安全的认证密钥协商协议 [J ] . 电子与信息学报 , 2014 , 36 ( 12 ): 2848 - 2854 .
CAO C L , LIU M Q , ZHANG R , et al . Provably secure authenticated key agreement protocol based on hierarchical identity [J ] . Journal of Electronics & Information Technology , 2014 , 36 ( 12 ): 2848 - 2854 .
LIU W , LIU J , WU Q , et al . SAKE: scalable authenticated key ex-change for mobile e‐health networks [J/OL ] . Security and Communication Networks , http://onlinelibrary.wiley.com/doi/10.1002/sec.1198/epdf http://onlinelibrary.wiley.com/doi/10.1002/sec.1198/epdf .
CHOW S S M , ROTH V , RIEFFEL E G . General certificateless en-cryption and timed-release encryption [M ] . Security and Cryptography for Networks ,Springer Berlin Heidelberg, 2008 : 126 - 143 .
HANKERSON D , VANSTONE S , MENEZES A J . Guide to elliptic curve cryptography [M ] . Springer Science & Business Media , 2004 .
LIPPOLD G , BOYD C , NIETO J G . Strongly secure certificateless key agreement [M ] . Pairing-Based Cryptography-Pairing 2009 ,Springer Berlin Heidelberg, 2009 : 206 - 230 ..
0
浏览量
684
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构