首页 | 本学科首页   官方微博 | 高级检索  
     

基于身份的会议密钥协商算法
引用本文:蔡永泉,王亚丽. 基于身份的会议密钥协商算法[J]. 计算机工程, 2006, 32(13): 182-184
作者姓名:蔡永泉  王亚丽
作者单位:北京工业大学计算机科学与技术学院,北京,100022;北京工业大学计算机科学与技术学院,北京,100022
摘    要:利用Cha和Cheon提出的基于身份的数字签名方案,提出了一种新的会议密钥协商算法,并分析了该算法的正确性、安全性和执行效率。分析结果表明,在Gap Diffie-Hellman假设下,任何窃听者均无法得到有关会议密钥的任何信息,且无论存在多少恶意参与者,诚实参与者都能够协商出共同的会议密钥。该方案效率较高,有较强的灵活性、适应性和实用性。

关 键 词:会议密钥协商  基于身份  Tate配对
文章编号:1000-3428(2006)13-0182-03
收稿时间:2005-11-25
修稿时间:2005-11-25

Identity-based Conference Key Agreement Algorithm
CAI Yongquan,WANG Yali. Identity-based Conference Key Agreement Algorithm[J]. Computer Engineering, 2006, 32(13): 182-184
Authors:CAI Yongquan  WANG Yali
Affiliation:College of Computer Science and Technology, Beijing University of Technology, Beijing 100022
Abstract:Most of conference key agreement algorithms operate only when all participants are honest, but do not work when some participants are malicious and attempt to delay or destruct the conference. This paper presents a new conference key agreement algorithm based on the identity-based signature scheme given by Cha and Cheon. Under the Gap Diffie-Hellman assumption, honest participants can agree on a common conference key no matter how many participants are malicious, and passive adversaries get no information about the conference key established by honest participants. Furthermore, the algorithm is efficient, and has flexible structure and high adaptability.
Keywords:Conference key agreement   Identity-based   Tate pairing
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号