層次身份基認證密鑰協(xié)商方案的安全性分析和改進
doi: 10.11999/JEIT151443
基金項目:
國家自然科學基金(61272501),國家重點基礎(chǔ)研究發(fā)展計劃(2012CB315905)
Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme
Funds:
The National Natural Science Foundation of China (61272501), The National Key Basic Research Program of Ching (2012CB315905)
-
摘要: 該文分析了曹晨磊等人(2014)提出的層次身份基認證密鑰協(xié)商方案的安全性,指出該方案無法抵抗基本假冒攻擊。文中具體描述了對該方案實施基本假冒攻擊的過程,分析了原安全性證明的疏漏和方案無法抵抗該攻擊的原因。然后,在BONEH等人(2005)層次身份基加密方案基礎(chǔ)上提出了一種改進方案。最后,在BJM模型中,給出了所提方案的安全性證明。復雜度分析表明所提方案在效率上同原方案基本相當。
-
關(guān)鍵詞:
- 密碼學 /
- 可證明安全性 /
- 認證密鑰協(xié)商 /
- 層次身份基密碼體制
Abstract: The security of hierarchical identity based authenticated key agreement scheme which was proposed by CAO et al. (2014) is cryptanalyzed. First, it is pointed out that the scheme is not completely secure against the basic impersonation attack. Then, the process and the reasons of the attack are described. Finally, an improvement scheme to mend the security leaks is proposed based on the hierarchical identity based encryption (BONEH et al. 2005). The security proof of the proposal is presented in the BJM model. The computation efficiency of the proposed scheme is nearly equivalent to the CAO et al.s. -
BONEH D and FRANKLIN M. Identity-based encryption from the Weil pairing[C]. Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 2001: 213-229. SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Proceedings of 4rd Annual International Cryptology Conference, Santa Barbara, California, USA, 1984: 47-53. 夏松, 權(quán)建校, 韓文報. 不同PKG環(huán)境下可證安全的基于身份AKA協(xié)議[J]. 電子與信息學報, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382. XIA S, QUAN J, and HAN W. Provably secure identity-based authenticated key agreement protocols in multiple PKG environment[J]. Journal of Electronics Information Technology, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382. 曹雪菲, 寇衛(wèi)東, 樊凱, 等. 無雙線性對的基于身份的認證密鑰協(xié)商協(xié)議[J]. 電子與信息學報, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003. CAO X, KOU W, Fan K, et al. An identity-based authenticated key agreement protocol without bilinear pairing[J]. Journal of Electronics Information Technology, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003. HORWITZ J and LYNN B. Toward hierarchical identity-based encryption[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Netherland, 2002: 466-481. GENTRY C and SILVERBERG A. Hierarchical ID-based cryptography[C]. Proceedings of 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 548-566. BONEH D, BOYEN X, and GOH E. Hierarchical identity based encryption with constant size ciphertext[C]. Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 440-456. GUO H, MU Y, LI Z, et al. An efficient and non-interactive hierarchical key agreement protocol[J]. Computers Security, 2011, 30(1): 28-34. 曹晨磊, 劉明奇, 張茹, 等. 基于層級化身份的可證明安全的認證密鑰協(xié)商協(xié)議[J]. 電子與信息學報, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684. CAO C, LIU M, ZHANG R, et al. Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684. IBRIQ J and MAHGOUB I. HIKES: hierarchical key establishment scheme for wireless sensor networks[J]. International Journal of Communication Systems, 2014, 27(10): 1825-1856. KIM H. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS[J]. Sensors, 2014, 14(12): 23742-23757. doi: 10.3390/s141223742. GOLDWASSER S and MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299. BELLARE M and PHILLIP R. Random oracles are practical: a paradigm for designing efficient protocols[C]. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 1993: 62-73. BELLARE M and PHILLIP R. Entity authentication and key distribution[C]. Proceedings of 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 1993: 232-249. BLAKE-WILSON S, JOHNSON D, and MENEZES A. Key agreement protocols and their security analysis[C]. Proceedings of 6th IMA International Conference, Cirencester, UK, 2005: 30-45. LAMACCHIA B, LAUTER K, and MITYAGIN A. Stronger security of authenticated key exchange[C]. Proceedings of First International Conference ProvSec, Wollongong, Australia, 2007: 1-16. CHEN L, CHENG Z, and SMART N. Identity-based key agreement protocols from pairings[J]. International Journal of Information Security, 2007, 6(4): 213-241. 倪亮, 陳恭亮, 李建華. eCK模型的安全性分析[J]. 山東大學學報(理學版), 2013, 48(7): 46-48. NI L, CHEN G, and LI J. Security analysis of the eCK model[J]. Journal of Shandong University (Natural Science), 2013, 48(7): 46-48. FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]. Proceedings of 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 2012: 467-484. BONEH D and BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 223-238. ZHU G, XIONG H, and QIN Z. On the security of an efficient and non-interactive hierarchical key agreement protocol[J]. Wireless Personal Communications, 2014, 74(2): 883-889. 魏江宏, 劉文芬, 胡學先. 標準模型下可證安全的屬性基認證密鑰交換協(xié)議[J]. 軟件學報, 2014, 25(10): 2397-2408. WEI J, LIU W, and HU X. Provable secure attribute based authenticated key exchange protocols in the standard model[J]. Journal of Software, 2014, 25(10): 2397-2408. DENG H, WU Q, QIN B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J]. Information Sciences, 2014, 275: 370-384. LYNN B. On the implementation of pairing-based cryptosystems[D]. [Ph.D. dissertation], Stanford University, 2007. -
計量
- 文章訪問數(shù): 1332
- HTML全文瀏覽量: 174
- PDF下載量: 386
- 被引次數(shù): 0