首页 | 本学科首页   官方微博 | 高级检索  
     

层次身份基认证密钥协商方案的安全性分析和改进
引用本文:毛可飞, 陈杰, 刘建伟. 层次身份基认证密钥协商方案的安全性分析和改进[J]. 电子与信息学报, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
作者姓名:毛可飞  陈杰  刘建伟
基金项目:国家自然科学基金(61272501),国家重点基础研究发展计划(2012CB315905)
摘    要:该文分析了曹晨磊等人(2014)提出的层次身份基认证密钥协商方案的安全性,指出该方案无法抵抗基本假冒攻击。文中具体描述了对该方案实施基本假冒攻击的过程,分析了原安全性证明的疏漏和方案无法抵抗该攻击的原因。然后,在BONEH等人(2005)层次身份基加密方案基础上提出了一种改进方案。最后,在BJM模型中,给出了所提方案的安全性证明。复杂度分析表明所提方案在效率上同原方案基本相当。

关 键 词:密码学   可证明安全性   认证密钥协商   层次身份基密码体制
收稿时间:2015-12-22
修稿时间:2016-05-16

Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme
MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics & Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443
Authors:MAO Kefei  CHEN Jie  LIU Jianwei
Abstract:The security of hierarchical identity based authenticated key agreement scheme which was proposed by CAO et al. (2014) is cryptanalyzed. First, it is pointed out that the scheme is not completely secure against the basic impersonation attack. Then, the process and the reasons of the attack are described. Finally, an improvement scheme to mend the security leaks is proposed based on the hierarchical identity based encryption (BONEH et al. 2005). The security proof of the proposal is presented in the BJM model. The computation efficiency of the proposed scheme is nearly equivalent to the CAO et al.s.
Keywords:Cryptography  Provable security  Authenticated key agreement  Hierarchical identity based cryptography
点击此处可从《电子与信息学报》浏览原始摘要信息
点击此处可从《电子与信息学报》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号