高级搜索

层次身份基认证密钥协商方案的安全性分析和改进

毛可飞 陈杰 刘建伟

引用本文: 毛可飞, 陈杰, 刘建伟. 层次身份基认证密钥协商方案的安全性分析和改进[J]. 电子与信息学报, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443 shu
Citation:  MAO Kefei, CHEN Jie, LIU Jianwei. Security Analysis and Improvements of Hierarchical IdentityBased Authenticated Key Agreement Scheme[J]. Journal of Electronics and Information Technology, 2016, 38(10): 2619-2626. doi: 10.11999/JEIT151443 shu

层次身份基认证密钥协商方案的安全性分析和改进

摘要: 该文分析了曹晨磊等人(2014)提出的层次身份基认证密钥协商方案的安全性,指出该方案无法抵抗基本假冒攻击。文中具体描述了对该方案实施基本假冒攻击的过程,分析了原安全性证明的疏漏和方案无法抵抗该攻击的原因。然后,在BONEH等人(2005)层次身份基加密方案基础上提出了一种改进方案。最后,在BJM模型中,给出了所提方案的安全性证明。复杂度分析表明所提方案在效率上同原方案基本相当。

English

    1. [1]

      BONEH D and FRANKLIN M. Identity-based encryption from the Weil pairing[C]. Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 2001: 213-229.

    2. [2]

      SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Proceedings of 4rd Annual International Cryptology Conference, Santa Barbara, California, USA, 1984: 47-53.

    3. [3]

      夏松, 权建校, 韩文报. 不同PKG环境下可证安全的基于身份AKA协议[J]. 电子与信息学报, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.

    4. [4]

      XIA S, QUAN J, and HAN W. Provably secure identity-based authenticated key agreement protocols in multiple PKG environment[J]. Journal of Electronics Information Technology, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.

    5. [5]

      曹雪菲, 寇卫东, 樊凯, 等. 无双线性对的基于身份的认证密钥协商协议[J]. 电子与信息学报, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.

    6. [6]

      CAO X, KOU W, Fan K, et al. An identity-based authenticated key agreement protocol without bilinear pairing[J]. Journal of Electronics Information Technology, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.

    7. [7]

      HORWITZ J and LYNN B. Toward hierarchical identity-based encryption[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Netherland, 2002: 466-481.

    8. [8]

      GENTRY C and SILVERBERG A. Hierarchical ID-based cryptography[C]. Proceedings of 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 548-566.

    9. [9]

      BONEH D, BOYEN X, and GOH E. Hierarchical identity based encryption with constant size ciphertext[C]. Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 440-456.

    10. [10]

      GUO H, MU Y, LI Z, et al. An efficient and non-interactive hierarchical key agreement protocol[J]. Computers Security, 2011, 30(1): 28-34.

    11. [11]

      曹晨磊, 刘明奇, 张茹, 等. 基于层级化身份的可证明安全的认证密钥协商协议[J]. 电子与信息学报, 2014, 36(12): 2848-2854. doi:10.3724/SP.J.1146.2014.00684.

    12. [12]

      CAO C, LIU M, ZHANG R, et al. Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.

    13. [13]

      IBRIQ J and MAHGOUB I. HIKES: hierarchical key establishment scheme for wireless sensor networks[J]. International Journal of Communication Systems, 2014, 27(10): 1825-1856.

    14. [14]

      KIM H. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS[J]. Sensors, 2014, 14(12): 23742-23757. doi: 10.3390/s141223742.

    15. [15]

      GOLDWASSER S and MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.

    16. [16]

      BELLARE M and PHILLIP R. Random oracles are practical: a paradigm for designing efficient protocols[C]. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 1993: 62-73.

    17. [17]

      BELLARE M and PHILLIP R. Entity authentication and key distribution[C]. Proceedings of 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 1993: 232-249.

    18. [18]

      BLAKE-WILSON S, JOHNSON D, and MENEZES A. Key agreement protocols and their security analysis[C]. Proceedings of 6th IMA International Conference, Cirencester, UK, 2005: 30-45.

    19. [19]

      LAMACCHIA B, LAUTER K, and MITYAGIN A. Stronger security of authenticated key exchange[C]. Proceedings of First International Conference ProvSec, Wollongong, Australia, 2007: 1-16.

    20. [20]

      CHEN L, CHENG Z, and SMART N. Identity-based key agreement protocols from pairings[J]. International Journal of Information Security, 2007, 6(4): 213-241.

    21. [21]

      倪亮, 陈恭亮, 李建华. eCK模型的安全性分析[J]. 山东大学学报(理学版), 2013, 48(7): 46-48.

    22. [22]

      NI L, CHEN G, and LI J. Security analysis of the eCK model[J]. Journal of Shandong University (Natural Science), 2013, 48(7): 46-48.

    23. [23]

      FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]. Proceedings of 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 2012: 467-484.

    24. [24]

      BONEH D and BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 223-238.

    25. [25]

      ZHU G, XIONG H, and QIN Z. On the security of an efficient and non-interactive hierarchical key agreement protocol[J]. Wireless Personal Communications, 2014, 74(2): 883-889.

    26. [26]

      魏江宏, 刘文芬, 胡学先. 标准模型下可证安全的属性基认证密钥交换协议[J]. 软件学报, 2014, 25(10): 2397-2408.

    27. [27]

      WEI J, LIU W, and HU X. Provable secure attribute based authenticated key exchange protocols in the standard model[J]. Journal of Software, 2014, 25(10): 2397-2408.

    28. [28]

      DENG H, WU Q, QIN B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J]. Information Sciences, 2014, 275: 370-384.

    29. [29]

      LYNN B. On the implementation of pairing-based cryptosystems[D]. [Ph.D. dissertation], Stanford University, 2007.

    1. [1]

      夏松, 权建校, 韩文报. 不同PKG环境下可证安全的基于身份AKA协议. 电子与信息学报, 2010, 32(10): 2393-2399.

    2. [2]

      熊晓雯, 魏爱国, 张智军. 构造具有良好密码学性质的旋转对称布尔函数. 电子与信息学报, 2012, 34(10): 2358-2362.

    3. [3]

      付立仕, 金晨辉. 基于仿射非正型变换的Lai-Massey模型的密码学缺陷. 电子与信息学报, 2013, 35(10): 2536-2540.

    4. [4]

      郭瑞, 金晨辉. 强安全可调加密方案的两个密码特性. 电子与信息学报, 2011, 33(7): 1761-1764.

    5. [5]

      孙银霞, 李晖, 李小青. 无证书体制下的多接收者签密密钥封装机制. 电子与信息学报, 2010, 32(9): 2249-2252.

    6. [6]

      张彦华, 胡予濮, 江明明, 来齐齐. 格上可撤销的基于身份的适应性安全的加密方案. 电子与信息学报, 2015, 37(2): 423-428.

    7. [7]

      胡学先, 魏江宏, 叶茂. 对一个强安全的认证密钥交换协议的分析. 电子与信息学报, 2013, 35(9): 2278-2282.

    8. [8]

      贾艳艳, 胡予濮, 杨文峰, 高军涛. 2轮Trivium的多线性密码分析. 电子与信息学报, 2011, 33(1): 223-227.

    9. [9]

      付向群, 鲍皖苏, 史建红, 李发达. 基于多离散对数问题的公钥密码. 电子与信息学报, 2014, 36(6): 1423-1427.

    10. [10]

      严迎建, 杨昌盛, 李伟, 张立朝. ZUC序列密码算法的选择IV相关性能量分析攻击. 电子与信息学报, 2015, 37(8): 1971-1977.

    11. [11]

      刘雪峰, 张玉清, 王鹤, 张光华. 一种后向撤销隐私安全的车载自组织网络快速匿名消息认证协议. 电子与信息学报, 2014, 36(1): 94-100.

    12. [12]

      金海旻, 许胤龙, 王石. 无线网络中高效的匿名漫游安全协议. 电子与信息学报, 2010, 32(8): 1961-1967.

    13. [13]

      王晨旭, 李景虎, 喻明艳, 王进祥. 基于FPGA平台的Piccolo功耗分析安全性评估. 电子与信息学报, 2014, 36(1): 101-107.

    14. [14]

      张玉磊, 李臣意, 王彩芬, 张永洁. 无证书聚合签名方案的安全性分析和改进. 电子与信息学报, 2015, 37(8): 1994-1999.

    15. [15]

      邓淼磊, 王玉磊, 周利华. 通用可组合的三方口令认证密钥交换协议. 电子与信息学报, 2010, 32(8): 1948-1952.

    16. [16]

      杨孝鹏, 马文平, 张成丽. 一种新型基于环上带误差学习问题的认证密钥交换方案. 电子与信息学报, 2015, 37(8): 1984-1988.

    17. [17]

      潘森杉, 胡予濮, 王保仓. 齐次F5算法的简单终止性证明. 电子与信息学报, 2015, 37(8): 1989-1993.

    18. [18]

      徐新龙, 韩文报. 基于减轮KASUMI的f9算法单密钥攻击. 电子与信息学报, 2013, 35(2): 303-309.

    19. [19]

      刘向辉, 韩文报, 权建校. 基于遗传策略的格基约化算法. 电子与信息学报, 2013, 35(8): 1940-1945.

    20. [20]

      潘森杉, 胡予濮, 王保仓. 基于标签的矩阵型Grbner基算法研究. 电子与信息学报, 2015, 37(4): 881-886.

  • 加载中
计量
  • PDF下载量:  367
  • 文章访问数:  502
  • HTML全文浏览量:  33
文章相关
  • 收稿日期:  2015-12-22
  • 录用日期:  2016-05-16
  • 刊出日期:  2016-10-19
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

/

返回文章