通信学报 ›› 2017, Vol. 38 ›› Issue (8): 19-27.doi: 10.11959/j.issn.1000-436x.2017176

• 学术论文 • 上一篇    下一篇

基于身份的移动互联网高效认证密钥协商协议

王真,马兆丰,罗守山   

  1. 北京邮电大学网络空间安全学院,北京 100876
  • 修回日期:2017-04-18 出版日期:2017-08-01 发布日期:2017-09-07
  • 作者简介:王真(1989-),男,河南舞阳人,北京邮电大学博士生,主要研究方向为信息安全、移动互联网安全、信息安全与灾备技术。|马兆丰(1974-),男,甘肃镇原人,博士,北京邮电大学讲师,主要研究方向为数字版权管理、移动互联网安全、计算机网络安全。|罗守山(1962-),男,安徽肥东人,北京邮电大学教授、博士生导师,主要研究方向为编码密码学、网络与信息安全。
  • 基金资助:
    国家自然科学基金资助项目(61272519);国家自然科学基金资助项目(61170297);国家自然科学基金资助项目(61572080);国家自然科学基金资助项目(61472258)

Identity-based efficient authentication and key agreement protocol for mobile Internet

Zhen WANG,Zhao-feng MA,Shou-shan LUO   

  1. School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China
  • Revised:2017-04-18 Online:2017-08-01 Published:2017-09-07
  • Supported by:
    The Nationa1 Natura1 Science Foundation of China(61272519);The Nationa1 Natura1 Science Foundation of China(61170297);The Nationa1 Natura1 Science Foundation of China(61572080);The Nationa1 Natura1 Science Foundation of China(61472258)

摘要:

针对椭圆曲线中双线性对运算计算开销较大和PKI中证书管理的问题,利用基于身份的公钥密码算法和椭圆曲线加法群上的 GDH 困难问题,设计了一种高效安全的认证密钥协商协议,并在随机预言机模型下证明了协议的安全性。分析表明,该协议满足已知会话密钥安全性、完美前向安全性、抗临时密钥泄露攻击和抗会话密钥托管等安全属性,且能够在仅5次标量乘法运算后完成参与方之间的相互认证和会话密钥协商,具有较小的计算开销。

关键词: 基于身份密码学, 认证密钥协商, 随机预言机模型, 椭圆曲线

Abstract:

For the bad computation overhead of bi1inear pairings in e11iptic curve and the prob1ems of certificate management in the PKI,an efficient and secure authentication key agreement protoco1 was proposed based on the identity-based cryptosystem and GDH difficu1t prob1em on the additive group of e11iptic curve.Meanwhi1e,the security of the new protoco1 was proved under the random orac1e mode1.The ana1ysis shows that the new protoco1 meets security properties such as known session key security,perfect forward security,ephemera1 secret 1eakage resistance and the session key escrow resistance.The proposed protoco1 has the good computationa1 overhead for it was ab1e to comp1ete the mutua1 authentication and session key agreement between parties under on1y 5 times sca1ar mu1tip1ication.

Key words: identity-based cryptosystem, authentication key agreement, random orac1e mode1, e11iptic curve

中图分类号: 

No Suggested Reading articles found!