期刊文献+

无双线性对的无证书组密钥协商协议的安全性分析及改进

SECURITY ANALYSIS AND IMPROVEMENT OF A CERTIFICATELESS GROUP KEY AGREEMENT PROTOCOL WITHOUT BILIMEAR PAIRING
下载PDF
导出
摘要 对新近提出的一个无双线性对匿名的无证书动态组密钥协商协议进行安全性分析,指出该协议是不安全的。在协议执行过程中密钥生成中心KGC并不能确定对方的真实身份,导致该协议能够受到替换公钥攻击。给出克服该攻击的两种改进方法。 This paper analyzes the security of a newly proposed certificateless dynamic group key agreement protocol without bilinear pairing,and points out that the protocol is insecure.The KGC(Key Generation Center)cannot determine the real identity of the other party during the execution of the protocol,resulting in the protocol being vulnerable to the public key replacement attack.We give two improved methods to resist the attack.
作者 张金辉 黄加成 梁红梅 李慧敏 Zhang Jinhui;Huang Jiacheng;Liang Hongmei;Li Huimin(Key Laboratory of Fujian University of Applied Mathematics,Putian 351100,Fujian,China;School of Mathematics and Finance,Putian University,Putian 351100,Fujian,China;School of Mathematics and Statistics,Minnan Normal University,Zhangzhou 363000,Fujian,China)
出处 《计算机应用与软件》 北大核心 2020年第7期287-291,323,共6页 Computer Applications and Software
基金 国家自然科学基金项目(61373140,61170246) 福建省教育厅中青年教师教育科研项目(JT180487) 福建省高校创新团队培育计划 莆田学院科研创新专项项目(2018ZP12)。
关键词 无证书 匿名性 组密钥协商 双线性对 离散对数问题 Certificateless Anonymity Group key agreement Bilinear pairing Discrete logarithm problem
  • 相关文献

参考文献6

二级参考文献67

  • 1彭长艳.空间网络安全关键技术研究[D].长沙:国防科学技术大学,2010. 被引量:12
  • 2Rafaeli S, Hutchison D. A survey of key management for secure group communication [J]. ACM Computing Surveys, 2003, 35(3): 309-329. 被引量:1
  • 3Zhao Xingwen, Zhang Fangguo, Tian Haibo. Dynamic asymmetric group key agreement for ad hoc networks [J]. Ad Hoc Networks, 2011, 9(5): 928-939. 被引量:1
  • 4Cao X, Kou W, Du X. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15): 2895- 2903. 被引量:1
  • 5Chang Tingyi, Hwang Minshiang, Yang Weipang. A communication efficient three-party password authenticated key exchange protocol [J]. Information Sciences, 2011, 181 (1): 217-226. 被引量:1
  • 6Guo Hua, Li Zhoujun, Mu Yi, et al. Provably secure identity based authenticated key agreement protocols with malicious private key generators [J]. Information Sciences, 2011, 181(3):628-647. 被引量:1
  • 7Zhang L, Zhang F, Wu Q, et al. Simulatable certificateless two-party authenticated key agreement protocol[J]. Information Sciences, 2010, 180(6): 1020-1030. 被引量:1
  • 8Just M, Vaudenay S. Authenticated multi-party key agreement [G] //LNCS 1163: Proc of the 1996 Int Conf on the Theory and Applications of Cryptology and Information Security. Berlin: Springer, 1996: 36-49. 被引量:1
  • 9Burmester M, Desmedt Y. A secure and scalable group key exchange system [J]. Information Processing Letters, 2005, 94(3): 137-143. 被引量:1
  • 10Bohli JM, Glas B, Steinwandt R. Towards provably secure group key agreement building on group theory [G] //LNCS 4341: Proc of Cryptology-VIETCRYPT. Berlin: Springer, 2006:322-336. 被引量:1

共引文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部