对Tasi群密钥协商协议的改进及安全分析
Improvement and security analysis on Tasi's group key agreement
-
摘要: 针对J.L.Tsai等人提出的移动环境下群密钥协商协议存在的安全缺陷,利用数字签名技术,对其进行了改进:在数字签名中加入序列号,用以标记签名和将要生成的群密钥的次序,并将序列号作为数字签名公开验证信息之一,从而实现对移动用户或者具有较强计算能力的节点所发送消息的及时验证.由安全分析可知,改进后的协议不仅具有原来的安全特性,而且可以抵抗重放攻击或冒充攻击.Abstract: Aimed at the security defect of group key agreement protocol for mobile environment proposed by J.L.Tsai,the protocol was improved by using the digital signature technology.That is,some serial numbers were inserted in the digital signatures so as to identify the signatures and the order of the group keys to be generated,and the serial numbers were used as part of public information to verify the digital signatures.So the freshness of messages sent by the mobile users or the powerful node could be checked.According to the security analysis,it is found that the improved protocol not only had the old security properties,but also could resist against impersonation attack or forgery attack.
-
-
[1]
Asokan N,Ginzboorg P.Key agreement in ad hoc networks[J].Computer Communications,2000,23(17):1627.
-
[2]
Burmester M,Desmedt Y.Advances in Cryptology-EUROCRYPT'94[M]. Berlin:Springer Berlin Heidelberg,1994:275-286.
-
[3]
Bresson E,Catalano D.Public Key Cryptography-PKC 2004[M].Berlin:Springer Berlin Heidelberg,2004:115-129.
-
[4]
Katz J,Yung M.Scalable protocol for authenticated group key exchange[J].Journal of Cryptology,2007,20(1):85.
-
[5]
Nam J,Lee J,Kim S,et al.DDH-based group key agreement in a mobile environment[J].Journal of Systems and Software,2005,78(1):73.
-
[6]
Tseng Y M.A resource-constrained group key agreement protocol for imbalanced wireless networks[J].Computer & Security,2007,26(4):331.
-
[7]
Lee C C,Lin T H,Tsai C S.A new authenticated group key agreement in a mobile environment[J].Annals of Telecommunications,2009,64(11-12):735.
-
[8]
Tsai J L.A novel authenticated group key agreement protocol for mobile environment[J].Annals of Telecommunications,2011,66(11-12):663.
-
[9]
Teng J,Wu C K,Tang C.An ID-based authenticated dynamic group keyagreement with optimal round[J].Science China Information Sciences,2012,55(11):2542.
-
[10]
Konstantinou E.Network and System Security[M].Berlin:Springer Berlin Heidelberg,2013:563-574.
-
[11]
Hu K W,Xue J F,Hu C Z,et al.An improved id-based group key agreement protocol[J].Tsinghua Science and Technology,2014,19(5):421.
-
[12]
Zhang F G,Safavi-Naini R,Susilo W.Public Key Cryptography-PKC 2004[M].Berlin:Springer Berlin Heidelberg,2004:277-290.
-
[13]
Zhang J H,Yang Y X,Niu X X.Advances in Neural Networks-ISNN 2009[M].Berlin:Springer Berlin Heidelberg,2009:318-327.
-
[1]
计量
- PDF下载量: 17
- 文章访问数: 992
- 引证文献数: 0