浏览全部资源
扫码关注微信
北京邮电大学网络空间安全学院,北京 100876
[ "王真(1989-),男,河南舞阳人,北京邮电大学博士生,主要研究方向为信息安全、移动互联网安全、信息安全与灾备技术。" ]
[ "马兆丰(1974-),男,甘肃镇原人,博士,北京邮电大学讲师,主要研究方向为数字版权管理、移动互联网安全、计算机网络安全。" ]
[ "罗守山(1962-),男,安徽肥东人,北京邮电大学教授、博士生导师,主要研究方向为编码密码学、网络与信息安全。" ]
网络出版日期:2017-08,
纸质出版日期:2017-08-25
移动端阅览
王真, 马兆丰, 罗守山. 基于身份的移动互联网高效认证密钥协商协议[J]. 通信学报, 2017,38(8):19-27.
Zhen WANG, Zhao-feng MA, Shou-shan LUO. Identity-based efficient authentication and key agreement protocol for mobile Internet[J]. Journal on communications, 2017, 38(8): 19-27.
王真, 马兆丰, 罗守山. 基于身份的移动互联网高效认证密钥协商协议[J]. 通信学报, 2017,38(8):19-27. DOI: 10.11959/j.issn.1000-436x.2017176.
Zhen WANG, Zhao-feng MA, Shou-shan LUO. Identity-based efficient authentication and key agreement protocol for mobile Internet[J]. Journal on communications, 2017, 38(8): 19-27. DOI: 10.11959/j.issn.1000-436x.2017176.
针对椭圆曲线中双线性对运算计算开销较大和PKI中证书管理的问题,利用基于身份的公钥密码算法和椭圆曲线加法群上的 GDH 困难问题,设计了一种高效安全的认证密钥协商协议,并在随机预言机模型下证明了协议的安全性。分析表明,该协议满足已知会话密钥安全性、完美前向安全性、抗临时密钥泄露攻击和抗会话密钥托管等安全属性,且能够在仅5次标量乘法运算后完成参与方之间的相互认证和会话密钥协商,具有较小的计算开销。
For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH difficu1t prob1em on the additive group of e11iptic curve.Meanwhi1e,the security of the new protoco1 was proved under the random orac1e mode1.The ana1ysis shows that the new protoco1 meets security properties such as known session key security,perfect forward security,ephemera1 secret 1eakage resistance and the session key escrow resistance.The proposed protoco1 has the good computationa1 overhead for it was ab1e to comp1ete the mutua1 authentication and session key agreement between parties under on1y 5 times sca1ar mu1tip1ication.
REDDY A G , YOON E J , DAS A K , et al . Lightweight authentication with key-agreement protocol for mobile network environment using smart cards [J ] . IET Information Security , 2016 , 10 ( 5 ): 272 - 282 .
SHAMIR A , . Identity-based cryptosystems and signature schemes [C ] // Workshop on the Theory and Application of Cryptographic Techniques . Springer Berlin Heidelberg , 1984 : 47 - 53 .
王圣宝 , 曹珍富 , 董晓蕾 . 标准模型下可证安全的身份基认证密钥协商协议 [J ] . 计算机学报 , 2007 , 30 ( 10 ): 1842 - 1852 .
WANG S B , CAO Z F , DONG X L . Provably secure identity-based authenticated key agreement protocols in the standard model [J ] . Chinese Journal of Computers , 2007 , 30 ( 10 ): 1842 - 1852 .
曹雪菲 , 寇卫东 , 樊凯 , 等 . 无双线性对的基于身份的认证密钥协商协议 [J ] . 电子与信息学报 , 2009 , 31 ( 5 ): 1241 - 1244 .
CAO X F , KOU W D , FAN K , et al . An identity-based authenticated key agreement protocol without bilinear pairing [J ] . Journal of Electronics and Information Technology , 2009 , 31 ( 5 ): 1241 - 1244 .
高海英 . 可证明安全的基于身份的认证密钥协商协议 [J ] . 计算机研究与发展 , 2012 , 49 ( 8 ): 1685 - 1689 .
GAO H Y . Provable secure ID-based authenticated key agreement protocol [J ] . Journal of Computer Research and Development , 2012 , 49 ( 8 ): 1685 - 1689 .
ISLAM S H . A provably secure ID-based mutual authentication and key agreement scheme for mobile multi-server environment without ESL attack [J ] . Wireless Personal Communications , 2014 , 79 ( 3 ): 1975 - 1991 .
高志刚 , 冯登国 . 高效的标准模型下基于身份认证密钥协商协议 [J ] . 软件学报 , 2011 , 22 ( 5 ): 1031 - 1040 .
GAO Z G , FENG D G . Efficient identity-based authenticated key agreement protocol in the standard model [J ] . Journal of Software , 2011 , 22 ( 5 ): 1031 - 1040 .
CHEN L , CHENG Z , SMART N P . Identity-based key agreement protocols from pairings [J ] . International Journal of Information Security , 2007 , 6 ( 4 ): 213 - 241 .
KILINC H H , ALLABERDIYEV Y , YANIK T , et al . Efficient ID-based authentication and key agreement protocols for the session initiation protocol [J ] . Turkish Journal of Electrical Engineering &Computer Sciences , 2015 , 23 ( 2 ): 560 - 579 .
SUN H , WEN Q , ZHANG H , et al . A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption [J ] . Security and Communication Networks , 2015 , 8 ( 17 ): 3167 - 3179 .
AL-RIYAMI S S , PATERSON K G . Certificateless public key cryptography [C ] // International Conference on the Theory and Application of Cryptology and Information Security . Springer Berlin Heidelberg , 2003 : 452 - 473 .
ZHANG L . Certificateless one-pass and two-party authenticated key agreement protocol and its extensions [J ] . Information Sciences , 2015 , 293 : 182 - 195 .
GHOREISHI S M , RAZAK S A , ISNIN I F , et al . New secure identity-based and certificateless authenticated key agreement protocols without pairings [C ] // Biometrics and Security Technologies(ISBAST),2014 International Symposium . IEEE , 2014 : 188 - 192 .
HUANG H , CAO Z . An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem [C ] // ACM Symposium on Information,Computer and Communications Security,ASIACCS 2009 . Sydney,Australia,DBLP , 2009 : 333 - 342 .
FIORE D , GENNARO R . Identity-based key exchange protocols without pairings [M ] // Transactions on Computational Science X . Springer-Verlag , 2010 : 42 - 77 .
李坤 . 基于身份的认证密钥协商协议研究 [D ] . 西安电子科技大学 , 2013 .
LI K . Study of identity-based authentication key exchange protocol [D ] . Xidian University , 2013 .
0
浏览量
1092
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构