摘要
认证密钥协商协议是一个非常重要的密码学概念,可以用来确保数据的保密性和完整性。通过在密钥协商中加入隐式认证,可以使得用户确认只有其指定方才能完成与其的密钥协商,从而避免传统密钥协商协议的中间人攻击。目前大部分认证密钥协商协议使用了双线性对,但双线性对的计算效率较低,因此研究并设计不使用双线性对的认证密钥协商协议一直是一个研究的热点。尽管一些学者提出了一些方案,但是这些方案构造仍显复杂,为了提高协议的运行效率,文章研究并提出了一种基于身份的认证密钥协商协议,协议不使用双线性对,同时协议构造简单,安全性好。在e CK模型下,将协议的安全性规约到CDH数学困难假设,形式化地证明了协议的安全性。最后通过协议对比,表明文章提出的协议运行效率更高,安全性更好。
A uthenticated key agreement protocol is a very im portant concept o f cryptography,w hich can be used to ensure the co n fid en tiality and in teg rity o f data. By adding an im plicitauthentication in the key agreement, the user can confirm that only the intended party can completekey agreement with himself. The method avoids the middle m an attack in traditional key agreementprotocol. A t present, most o f the authenticated key agreement protocols use bilinear pairing which has low com putational efficiency. T herefore it is a hot research topic to study and design the authentication key agreement protocol w ithout using bilinear pairing. Although some scholars have put forw ard some schem es, the construction of these schem es is still som ew hat com plicated. In order to improve the efficiency o f the protocol, this paper presents an identity-based authenticated key agreement protocols w ithout using bilinear pairings. At the same time, the protocol is simple in structure and good in security. The protocol’s security is reduced to CDH m athem atical difficulty hypothesis, and is formally proved in the eCK model. By comparison, it shows that the protocol has higher efficiency and better security.
作者
矢敏
叶伟伟
欧庆于
SHI Min;YE Weiwei;OU Qingyu(91551 Troops ofPLA, Jiujiang Jiangxi 332006, China;Department of Information Security, Naval University of Engineerings Wuhan Hubei 430033, China)
出处
《信息网络安全》
2016年第10期21-27,共7页
Netinfo Security
基金
国家自然科学基金[6110042
6120238]
关键词
认证密钥协商
eCK模型
CDH数学困难假设
双线性对
authenticated key agreement
eCK model
CDH mathematical difficult hypothesis
bilinear pairing