面向Lippold安全模型的无证书两方认证密钥协商协议  

A Certificateless Two-party Authenticated Key Agreement Protocol under the Lippold Security Model

在线阅读下载全文

作  者:张萌楠 马垚 陈永乐 于丹 ZHANG Mengnan;MA Yao;CHEN Yongle;YU Dan(College of Information and Computer,Taiyuan University of Technology,Jinzhong 030600,China)

机构地区:[1]太原理工大学信息与计算机学院,山西晋中030600

出  处:《太原理工大学学报》2023年第5期773-781,共9页Journal of Taiyuan University of Technology

基  金:山西省自然科学基金资助项目(201903D121121,201701D111002)。

摘  要:【目的】通过分析Lippold安全模型中的会话部分密钥泄露伪装攻击(P-KCI),发现现有无证书密钥协商协议存在安全缺陷,无法抵挡会话部分密钥泄露伪装攻击。【方法】总结了Lippold安全模型中会话部分密钥泄露伪装攻击的8种不同密钥组合泄露攻击,利用这些攻击,分析了现有无证书密钥协商协议的安全缺陷。【结果】提出了一种可以完全抵挡P-KCI攻击的高效无证书两方认证密钥协商协议,并扩展了eCK(extended extended-Canetti-Krawczyk)模型,证明了本协议的安全性。【结论】与现有的同类协议相比,本文协议安全性有较大提高且计算损耗降低了28.4%.【Purposes】By analyzing the session partial key disclosure camouflage attack(P-KCI)in Lippold security model,it is found that the existing certificateless key agreement proto-cols have security defects that they can’t resist the P-KCI attack.【Methods】In this paper,eight different key combination disclosure attacks of session partial key disclosure camouflage attack in Lippold security model are summarized.Besides,the security defects of existing certificateless key agreement protocols are analyzed by using these attacks.【Findings】A secure and efficient pairing-free CT-AKA protocol that can perfectly resist P-KCI attack is proposed,and its security is analyzed in an extended extended-Canetti-Krawczyk(eCK)model.【Conclusions】Compared with other existing similar protocols,the proposed protocol is more secure,and the calculated loss is reduced by 28.4%.

关 键 词:无证书 无配对 认证密钥协商 会话部分密钥泄露伪装攻击(P-KCI) Lippold安全模型 eCK模型 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象