期刊文献+

ID-based Key-insulated Authenticated Key Agreement Protocol 被引量:1

ID-based Key-insulated Authenticated Key Agreement Protocol
下载PDF
导出
摘要 The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed. The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information. Comparing with the traditional certificate-based cryptography, identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate. However, exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost. In this paper, an ID-based authenticated key agreement protocol was presented. For solving the problem of key exposure of the basic scheme, the technique of key insulation was applied and a key insulated version is developed.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第2期247-249,共3页 上海交通大学学报(英文版)
关键词 ID-BASED KEY-INSULATED key agreement 密码系统 安全保证 基于身份密码学 基于密钥绝缘体制
  • 相关文献

同被引文献11

  • 1Guillou L, Quisquater J. A practical zero-knowledge protocol fitted to security microprocessors minimizing both transmission and memory [C]//Advances in Cryptology-Eurocryp( 1988. Berlin: Springer-Verlag, 1988: 123-128.
  • 2Shamir A. Identity-based cryptosystem and signature schemes[C]//CRYPTO 84. Berlin: Springer-Verlag, 1984: 47-53.
  • 3Weng Jian, Liu Shengli, Chen Kefei, et al. Identity- based key-insulated signature without random oracles [C]//CIS 2006. Berlin: Springer-Verlag, 2007: 470- 480.
  • 4Boneh D, Franklin M. Short signature from well pairing[C]//Boyd C ASIACRYPT 2001. Berlin: Springer-Verlag, 2001: 514-532.
  • 5Zhang F G, Kim K. Signature-masked authentication using the bilinear pairings[R]. [s. l]: International Research Center for Information Security (IRIS), Information and Communications University (ICU), 2002.
  • 6Boneh D, Franklin M. Identity based encryption from well pairing[C]//CRYPTO 2001. Berlin: Springer- Verlag, 2001: 213-229.
  • 7Chen L, Harrison K. Applications of multiple trust authorities in pairing based cryptosystems [C] // LNCS 2437. Berlin: Springer-Verlag, 2002: 260- 275.
  • 8Al-Riyami S, Paterson K. Certificateless public key cryptography [C] // Advances in Cryptology-Asiacrypt' 2003. Berlin: Springer-Verlag, 2003: 452- 472.
  • 9Gentry C. Certificate-based encryption and the certificate revocation problem[C] // Advances in Cryptology-Eurovrypt 2003. Berlin: Springer-Verlag, 2003: 272-293.
  • 10Lee B, Boyd E, Daeson E, et al. Secure key issuing in ID-based cryptography[C]// Proceedings of the Second Australian Information Security Workshop-AISW 2004. Dunedin, New Zealand: Australian Computer Society Inc, 2004: 69-74.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部