摘要
针对双线性对运算耗时较多和PKI证书管理负担重的问题,王真等人提出基于身份的移动互联网高效认证密钥协商协议(通信学报,2017年第8期),但该协议不能抵抗临时私钥泄露攻击,不具备eCK安全性。为此,提出一种不使用双线性对运算的身份基认证密钥协商协议,并在GDH假设和随机预言机模型下,证明其具备eCK安全性。分析结果表明,该协议密钥协商阶段仅需4个椭圆曲线点乘运算,与CKD-10、XW-12、WML-17等协议相比效率较高,单轮通信次数和计算代价较少,适用于移动互联网环境。
To address the problems of time-consuming bilinear pairings and the heavy burden of PKI certificate management,WANG Z,et al.proposed an identity-based efficient Authentication Key Agreement(AKA) protocol for mobile Internet(Journal of Communications,2017,No.8),but this protocol cannot resist the attack of temporary private key leakage and does not have eCK security.For this reason,an identity-based authentication AKA protocol without bilinear pairings operation is proposed,whose eCK security is proved under the GDH assumption and random oracle model.Analysis results show that this protocol only needs four elliptic curve point multiplication in the key agreement stage,which is more efficient than CKD-10,XW-12,WML-17 and other protocols.Meanwhile,its single round communication times and computational cost are less,which is suitable for mobile Internet environment.
作者
孙海燕
李玲玲
张玲
张建伟
黄万伟
SUN Haiyan;LI Lingling;ZHANG Ling;ZHANG Jianwei;HUANG Wanwei(Software Engineering College,Zhengzhou University of Light Industry,Zhengzhou 450002,China)
出处
《计算机工程》
CAS
CSCD
北大核心
2019年第9期153-160,182,共9页
Computer Engineering
基金
国家自然科学基金(61502436,61672471)
河南省科技攻关项目(172102210060)
郑州轻工业大学博士基金(2014BSJJ081)
关键词
双线性对
攻击
eCK模型
基于身份的密码学
认证密钥协商
bilinear pairings
attack
eCK model
identity-based cryptography
Authentication Key Agreement(AKA)