首页 | 官方网站   微博 | 高级检索  
     

结合双线性对和DLP的无证书两方认证协议
引用本文:王磊,张秀杰,李永广,郑宝玉.结合双线性对和DLP的无证书两方认证协议[J].信号处理,2017,33(3):406-411.
作者姓名:王磊  张秀杰  李永广  郑宝玉
作者单位:南京邮电大学信号处理与传输研究院
基金项目:国家自然科学基金(61271240, 61671253);江苏省高校自然科学基金重大项目(16KJA510004);江苏省优势学科发展计划;东南大学移动通信国家重点实验室开放研究基金(2016D01);南京邮电大学宽带无线通信与传感网技术教育部重点实验室开放研究基金(NYKL201509)
摘    要:为解决无线通信网络中不同用户之间的通信安全问题,通常会采用身份认证协议来确保通信双方身份的合法性。该认证协议应能抵抗重放攻击、延时攻击等威胁,同时认证过程中的计算量应尽量小。本文针对SEAHA (secure and efficient handover authentication)认证方案存在的计算量大、不能抵抗伪装攻击的问题提出了一种基于双线性对和离散对数难题(DLP)的无证书两方认证协议。该协议中基站和节点共同生成节点密钥对来抵抗伪装攻击,利用离散对数难题生成会话密钥降低认证过程中的计算量。安全分析和性能分析结果表明,提出协议在保证安全性的前提下,有效降低了认证过程计算量。 

关 键 词:无线通信网络    两方认证    双线性对    离散对数难题
收稿时间:2016-11-02

Certificateless Two-party Identification Protocol Based on Bilinear-Pairing and DLP
Affiliation:Nanjing University of Posts & TelecommunicationsNational Mobile Communications Research Laboratory, Southeast University
Abstract:With the rapid development of wireless communication network (WSN), WSN can be quickly expanded to achieve increasingly prominent independent organization, etc., making it increasingly widespread range of applications. Generally, authentication protocols are adopted for the assurance of the legality of communication members to solve the safety problems between users in WSN. Such protocols are supposed to resist threats like replay attack, delay attack and etc. with a computational complexity that is as low as possible. We proposed a certificateless authenticated two-party protocol based on bilinear-pairing and discrete logarithm problem (DLP) to overcome existing disadvantages in secure and efficient handover authentication (SEAHA) such as high computational complexity and weakness against camouflage attack. In proposed protocol, node key is generated jointly by base and node simultaneously to resist camouflage attack, and the computational complexity in authentication process is significantly ameliorated as the session key is engendered by DLC. Security and performance analysis show that our protocol alleviated the computational complexity effectively under the premise of security. 
Keywords:
点击此处可从《信号处理》浏览原始摘要信息
点击此处可从《信号处理》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号