一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于對(duì)的組密鑰協(xié)商協(xié)議及其分析

張華 陳智雄 肖國(guó)鎮(zhèn)

張華, 陳智雄, 肖國(guó)鎮(zhèn). 基于對(duì)的組密鑰協(xié)商協(xié)議及其分析[J]. 電子與信息學(xué)報(bào), 2006, 28(2): 247-251.
引用本文: 張華, 陳智雄, 肖國(guó)鎮(zhèn). 基于對(duì)的組密鑰協(xié)商協(xié)議及其分析[J]. 電子與信息學(xué)報(bào), 2006, 28(2): 247-251.
Zhang Hua, Chen Zhi-xiong, Xiao Guo-zhen. A Pairing-Based Group Key Agreement Protocol and Its Analysis[J]. Journal of Electronics & Information Technology, 2006, 28(2): 247-251.
Citation: Zhang Hua, Chen Zhi-xiong, Xiao Guo-zhen. A Pairing-Based Group Key Agreement Protocol and Its Analysis[J]. Journal of Electronics & Information Technology, 2006, 28(2): 247-251.

基于對(duì)的組密鑰協(xié)商協(xié)議及其分析

A Pairing-Based Group Key Agreement Protocol and Its Analysis

  • 摘要: 在Shim(2003)的基于證書的三方密鑰協(xié)商協(xié)議的基礎(chǔ)上提出了一個(gè)基于對(duì)的組密鑰協(xié)商協(xié)議。通過在密鑰生成函數(shù)中引入偽隨機(jī)數(shù),防止了未知密鑰共享攻擊(the unknown key-share attack)和已知密鑰攻擊。給出了當(dāng)前文獻(xiàn)中已知的一些攻擊方法,并證明這些攻擊方法在此協(xié)議中是無效的。同時(shí)此協(xié)議具有前向安全和后向安全的特性,即在動(dòng)態(tài)組的情況下協(xié)議仍是安全的。
  • Bresson E, Chevassut O, Pointcheval D. Provably authenticated group Diffie-Hellman key exchange- the dynamic case, In C.Boyd, editor, Advances in Crytology-Proceedings of AsiaCrypt 2001, Springer-Verlag LNCS Vo1.2248, 2001: 290一309.[2]Pereira O. Modelling and security analysis of authenticated group key agreement protocols, PhD thesis. Universite Catholique de Louvain, 2003[3]Joux A. A one-round protocol for tripartite Dittie-Hellman,Algorithm Number Theory Symposium一ANTS-IV, Lecture Notes in Computer Science, 1838, Springer-Verlag, 2000:385一394.[4]Shim K. Efficient one-round tripartite authenticated key agreement protocol from the Weil pairing. Electronics Letters 2003, (39): 208一209.[5]Ateniese Giuseppe, Steiner Michael, Tsudik Gene. New multiparty authentication services and key agreement protocols.IEEE J on Selected Areas in Communications, 2000, 18(4).[6]Michael Steiner, Gene Tsudik, Michael Waidner. Key agreement in dynamic peer Groups[J].IEEE Trans. on Parallel and Distributed Systems.2000, 11(8):769-[7]Boneh D, Franklin M. Identity-based encryption from the Weil pairing. Advances in Cryptology一Crypto' 2001, Lecture Notes in Computer Science Vo1.2139, Springer-Verlag, 2001: 213一229.[8]AI-Riyami S S, Paterson K Q Tripartite; authenticated key agreement protocols from pairings. IIVIA Conference on Cryptography and Coding, Lecture Notes in Computer Science 2898, Springer-Verlag, 2003: 332一359.[9]Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. the Sixth IMA International Conference on Cryptography and Coding, Cirencester, England,1997: 30一45.[10]Boneh D, Silverberg A. Applications of multilinear forms to cryptography, Contemporary Mathematics 324, American Mathematical Society, 2003: 71一90.[11]Chao-Wen Chan, Chin-Chen Chang. Key exchange protocols for multiparty communication services. Proceedings of the First International Symposium on Cyber Worlds (CW.02), IEEE, 2002:241一248.
  • 加載中
計(jì)量
  • 文章訪問數(shù):  2422
  • HTML全文瀏覽量:  140
  • PDF下載量:  641
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2004-07-12
  • 修回日期:  2005-01-08
  • 刊出日期:  2006-02-19

目錄

    /

    返回文章
    返回