首页> 外文期刊>Information and computation >An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries
【24h】

An efficient eCK secure identity based Two Party Authenticated Key Agreement scheme with security against active adversaries

机译:一种基于两方经认证的密钥协议计划的高效eCk安全身份,安全对抗主体对手

获取原文
获取原文并翻译 | 示例

摘要

A Two-Party Authenticated Key Agreement (2-PAKA) protocol facilitates two communicating entities to equally contribute to the establishment of a shared session key. IDentity-based 2-PAKA (ID-2-PAKA) protocols are widely researched, since it eliminates the need for explicit public-key verification using digital certificates. Over the years, ID-2-PAKA protocols with perfect forward secrecy and Key Generation Center forward secrecy were devised, to circumvent the inherent key escrows in identity based cryptosystems. Nevertheless, cryptanalysis of the recent ID-2-PAKA schemes reveals that many of the protocols are insecure. We reconstruct the possible attacks against the schemes and propose a secure escrowless pairing-free ID-2-PAKA protocol. The proposed scheme is proven secure in the modified extended Canetti-Krawczyk model, which captures all the desirable security attributes of ID-2-PAKA protocols, including, public key replacement attack resilience. Comparative analysis of the protocol with other pairing-free ID-2-PAKA schemes suggests that the proposed scheme offers a fine trade-off between efficiency and security.
机译:双方经过验证的关键协议(2-PAKA)协议促进了两个通信实体,同样有助于建立共享会话密钥。基于身份的2-PAKA(ID-2-PAKA)协议被广泛研究,因为它消除了使用数字证书的明确公钥验证的需求。多年来,设计了具有完美前锋保密和关键一代中心前进保密的ID-2-PAKA协议,以规避基于身份的密码系统中的固有键受体。然而,最近的ID-2-PAKA方案的密码分析揭示了许多协议是不安全的。我们重建了对该方案的可能攻击,并提出了一种安全的无障碍配对ID-2-PAKA协议。在修改的扩展CANETTI-KRAWZYK模型中证明了所提出的方案,其捕获ID-2-PAKA协议的所有可取的安全属性,包括公钥替换攻击弹性。与其他无配对ID-2-PAKA方案的协议的比较分析表明,拟议方案在效率和安全之间提供了精细的权衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号