一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

姓名
郵箱
手機號碼
標題
留言內(nèi)容
驗證碼

層次身份基認證密鑰協(xié)商方案的安全性分析和改進

毛可飛 陳杰 劉建偉

毛可飛, 陳杰, 劉建偉. 層次身份基認證密鑰協(xié)商方案的安全性分析和改進[J]. 電子與信息學報, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
引用本文: 毛可飛, 陳杰, 劉建偉. 層次身份基認證密鑰協(xié)商方案的安全性分析和改進[J]. 電子與信息學報, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
Citation: MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443

層次身份基認證密鑰協(xié)商方案的安全性分析和改進

doi: 10.11999/JEIT151443
基金項目: 

國家自然科學基金(61272501),國家重點基礎(chǔ)研究發(fā)展計劃(2012CB315905)

Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme

Funds: 

The National Natural Science Foundation of China (61272501), The National Key Basic Research Program of Ching (2012CB315905)

  • 摘要: 該文分析了曹晨磊等人(2014)提出的層次身份基認證密鑰協(xié)商方案的安全性,指出該方案無法抵抗基本假冒攻擊。文中具體描述了對該方案實施基本假冒攻擊的過程,分析了原安全性證明的疏漏和方案無法抵抗該攻擊的原因。然后,在BONEH等人(2005)層次身份基加密方案基礎(chǔ)上提出了一種改進方案。最后,在BJM模型中,給出了所提方案的安全性證明。復雜度分析表明所提方案在效率上同原方案基本相當。
  • BONEH D and FRANKLIN M. Identity-based encryption from the Weil pairing[C]. Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 2001: 213-229.
    SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Proceedings of 4rd Annual International Cryptology Conference, Santa Barbara, California, USA, 1984: 47-53.
    夏松, 權(quán)建校, 韓文報. 不同PKG環(huán)境下可證安全的基于身份AKA協(xié)議[J]. 電子與信息學報, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.
    XIA S, QUAN J, and HAN W. Provably secure identity-based authenticated key agreement protocols in multiple PKG environment[J]. Journal of Electronics Information Technology, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.
    曹雪菲, 寇衛(wèi)東, 樊凱, 等. 無雙線性對的基于身份的認證密鑰協(xié)商協(xié)議[J]. 電子與信息學報, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.
    CAO X, KOU W, Fan K, et al. An identity-based authenticated key agreement protocol without bilinear pairing[J]. Journal of Electronics Information Technology, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.
    HORWITZ J and LYNN B. Toward hierarchical identity-based encryption[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Netherland, 2002: 466-481.
    GENTRY C and SILVERBERG A. Hierarchical ID-based cryptography[C]. Proceedings of 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 548-566.
    BONEH D, BOYEN X, and GOH E. Hierarchical identity based encryption with constant size ciphertext[C]. Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 440-456.
    GUO H, MU Y, LI Z, et al. An efficient and non-interactive hierarchical key agreement protocol[J]. Computers Security, 2011, 30(1): 28-34.
    曹晨磊, 劉明奇, 張茹, 等. 基于層級化身份的可證明安全的認證密鑰協(xié)商協(xié)議[J]. 電子與信息學報, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.
    CAO C, LIU M, ZHANG R, et al. Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.
    IBRIQ J and MAHGOUB I. HIKES: hierarchical key establishment scheme for wireless sensor networks[J]. International Journal of Communication Systems, 2014, 27(10): 1825-1856.
    KIM H. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS[J]. Sensors, 2014, 14(12): 23742-23757. doi: 10.3390/s141223742.
    GOLDWASSER S and MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
    BELLARE M and PHILLIP R. Random oracles are practical: a paradigm for designing efficient protocols[C]. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 1993: 62-73.
    BELLARE M and PHILLIP R. Entity authentication and key distribution[C]. Proceedings of 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 1993: 232-249.
    BLAKE-WILSON S, JOHNSON D, and MENEZES A. Key agreement protocols and their security analysis[C]. Proceedings of 6th IMA International Conference, Cirencester, UK, 2005: 30-45.
    LAMACCHIA B, LAUTER K, and MITYAGIN A. Stronger security of authenticated key exchange[C]. Proceedings of First International Conference ProvSec, Wollongong, Australia, 2007: 1-16.
    CHEN L, CHENG Z, and SMART N. Identity-based key agreement protocols from pairings[J]. International Journal of Information Security, 2007, 6(4): 213-241.
    倪亮, 陳恭亮, 李建華. eCK模型的安全性分析[J]. 山東大學學報(理學版), 2013, 48(7): 46-48.
    NI L, CHEN G, and LI J. Security analysis of the eCK model[J]. Journal of Shandong University (Natural Science), 2013, 48(7): 46-48.
    FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]. Proceedings of 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 2012: 467-484.
    BONEH D and BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 223-238.
    ZHU G, XIONG H, and QIN Z. On the security of an efficient and non-interactive hierarchical key agreement protocol[J]. Wireless Personal Communications, 2014, 74(2): 883-889.
    魏江宏, 劉文芬, 胡學先. 標準模型下可證安全的屬性基認證密鑰交換協(xié)議[J]. 軟件學報, 2014, 25(10): 2397-2408.
    WEI J, LIU W, and HU X. Provable secure attribute based authenticated key exchange protocols in the standard model[J]. Journal of Software, 2014, 25(10): 2397-2408.
    DENG H, WU Q, QIN B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J]. Information Sciences, 2014, 275: 370-384.
    LYNN B. On the implementation of pairing-based cryptosystems[D]. [Ph.D. dissertation], Stanford University, 2007.
  • 加載中
計量
  • 文章訪問數(shù):  1332
  • HTML全文瀏覽量:  174
  • PDF下載量:  386
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2015-12-22
  • 修回日期:  2016-05-16
  • 刊出日期:  2016-10-19

目錄

    /

    返回文章
    返回