期刊文献+

一种基于椭圆曲线离散对数问题的非交互式可否认认证协议 被引量:2

A Non-interactive Deniable Authentication Protocol Based on Elliptic Curve Discrete Logarithm Problem
下载PDF
导出
摘要 可否认认证协议作为一种安全协议,被用在如电子选举等许多特殊领域中,由于交互式可否认认证协议的多次交互带来的安全隐患,非交互式可否认认证协议引起了更多的重视,提出一种基于椭圆曲线离散对数问题的非交互式可否认认证协议,椭圆曲线离散对数问题的难解性提高了密钥的保密性,保证了非交互式协议的安全,构建的非交互式可否认协议可以抵抗重放攻击、伪造攻击、冒充攻击和已知会话密钥攻击,基于形式化方法对该协议的可否认性进行了证明,最后通过与其他协议的比较,说明了该协议的安全性和高效. Deniable authentication protocol is the security protocol which is mainly used in special applications, for example, electronic voting. Owning to the inefficiency of the interactive deniable authentication protocol, the non-interactive deniable authentication protocol has got the serious interest in security protocol field. In this study a non-interactive deniable authentication based on elliptic curve discrete logarithm problem is presented. The proposed non-interactive deniable authentication protocol is secure and efficient, which can resist forgery attack, relay attack, known session key attack and impersonation attack. Its deniability is proved in formal method by automatic tool.
作者 邵飞 孟博
出处 《小型微型计算机系统》 CSCD 北大核心 2014年第1期89-92,共4页 Journal of Chinese Computer Systems
基金 国家"九七三"重点基础研究发展计划项目(2007CB310801)资助 国家自然科学基金项目(61170026 60940028 60703009 61100017)资助 湖北省杰出青年基金项目(2009CDA148)资助 武汉市科技局晨光计划项目(200950431189)资助 中央高校基本科研业务费专项基金(武汉大学)项目(2012211020203)资助
关键词 椭圆曲线 认证协议 非交互式 安全性 elliptic curve authentication protocol non-interactive security
  • 相关文献

参考文献9

  • 1Shao Z. Efficient deniable authentication protocol based on generalized ElGamal signature scheme[J].Computer Standards and Interfaces,2004,(05):449-454. 被引量:1
  • 2Lee W B,Wu C C,Tasur W J. A novel deniable authentication protocol using generalized E1Gamal signature scheme[J].Information Sciences,2007,(06):1376-1381. 被引量:1
  • 3Brown D R L. Deniable authentication with RSA and multicasting[EB/OL].http://eprint.iacr.org,2005. 被引量:1
  • 4Lu R,Cao Z F. Non-interactive deniable authentication protocol based on factoring[J].Computer Standards and Interfaces,2005,(04):401-405. 被引量:1
  • 5Meng B. A secure non-interactive deniable authentication protocol with strong deniability based on discrete logarithm problem and its application on intemet voting protocol[J].Information Technology Journal,2009,(03):302-309. 被引量:1
  • 6Koblitz N. Elliptic curve cryptosystems[J].Mathematics of Computation,1987,(177):203-209. 被引量:1
  • 7Bos J W,Kaibara M E,Kleinjung T. Montgomery on the security of 1024-bit RSA and 160-bit elliptic curve cryptography[EB/OL].http://eprint.iacr.org,2009. 被引量:1
  • 8Law L,Menezes A,Qu M. An efficient protocol for authenticated key agreement[J].Designs Codes and Cryptography,2003,(02):119-134. 被引量:1
  • 9Blanchet B. A computationally sound mechanized prover for security protocols[J].IEEE Transactions on Dependable and Secure Computing,2008,(04):193-207. 被引量:1

同被引文献22

引证文献2

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部