期刊文献+

辫群上密钥协商协议的改进与安全性分析

Improvement and Security Analysis of Key Agreement Protocol on Braid Group
下载PDF
导出
摘要 对辫群上密钥协商协议进行安全性分析,指出该协议无法抵抗中间人攻击,在密钥协商协议基础上,提出一种改进的密钥协商协议。该协议在密钥协商的过程中,采用辫群上的数字签名进行认证,有效防止中间人攻击和重放反射攻击。分析结果验证了该协议的安全性。 A security analysis of a key agreement protocol on the braid group is made. TBe key agreement protocol is not reliable because it can not resist man in the middle attack. The detailed attack method is given. On the basis of the original protocol, an improved braid key agreement protocol is presented. By using the signature scheme on braid groups in the key agreement authentication process, the improved protocol can prevent man in the middle attack and replay attack effectively. Analysis result proves the security of the scheme.
出处 《计算机工程》 CAS CSCD 2012年第6期142-144,共3页 Computer Engineering
基金 国家自然科学基金资助项目(11061014) 江西省教育厅青年科学基金资助项目(GJJ10129) 江西省教育厅科研基金资助项目(GJJ10708)
关键词 辫群 共轭搜索 密钥协商协议 数字签名 中间人攻击 重放攻击 braid group conjugacy search key agreement protocol digital signature man in the middle attack replay attack
  • 相关文献

参考文献9

  • 1Shor P W. Polynomial Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal on Computing, 1997, 26(5): 1484-1509.
  • 2Artin E. Theory of Braids[J]. The Annals of Mathematics, 1947, 48(1): 101-126.
  • 3Anshel I, Anshel M. From the Post-markov Decision Problems to Public-key Cryptography[J]. American Mathematical Monthly, 1993, 100(9): 835-845.
  • 4Yuji Moriwaki, Tetsuya Yamamoto, Kei Yamaguchi. Immunohistochemical Iocalization of aldehyde and xanthine oxidase in rat tissues using polyclonal antibodies. Histochem Cell Biol, 1996,105:71 - 79
  • 5Verma G. A Proxy Blind Signature Schemes over Braid Groups[J]. International Journal of Network Security, 2009, l9(3): 214-217.
  • 6汤学明,洪帆,崔国华.辫子群上新的难解问题及其密码学应用研究[J].计算机研究与发展,2006,43(7):1246-1251. 被引量:5
  • 7隗云,熊国华,鲍皖苏,张兴凯.辫群上新的签名体制[J].电子与信息学报,2010,32(12):2930-2934. 被引量:2
  • 8汤学明,洪帆,崔国华,王小非.一种改进的辫子群上的密钥协商协议[J].计算机科学,2006,33(8):121-125. 被引量:1
  • 9韩维维,何德彪.可证安全的椭圆曲线同源密钥协商协议[J].计算机工程,2011,37(1):128-130. 被引量:3

二级参考文献41

  • 1丁勇,田海博,王育民.一种改进的基于辫群的签名体制[J].西安电子科技大学学报,2006,33(1):50-52. 被引量:8
  • 2汤学明,洪帆,崔国华.辫子群上的公钥加密算法[J].软件学报,2007,18(3):722-729. 被引量:12
  • 3Rostovtsev A, Stolbunov A. Public-key Cryptosystem Based on Isogenies[EB/OL]. (2006-04-15). http://eprint.iacr.org.
  • 4Wilson S B, Johnson D, Menezes A. Key Agreement Protocols and Their Security Analysis[C]//Proc. of the 6th IMA International Conference on Cryptography and Coding. Cirencester, UK: Springer, 1997: 30-45.
  • 5Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans. on Information Theory, 1976, 22(6): 644-645.
  • 6Boneh D, Lipton R. Quantum Cryptanalysis of Hidden Linear Functions[C]//Proc, of the 15th Annual International Cryptology Conference on Advances in Cryptology. Santa Barbara, USA: Springer, 1995: 424-437.
  • 7P. W. Shor. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer [J]. SIAM Journal on Computing, 1997, 26(5) : 1484-1509
  • 8R. Boneh, R. Lipton. Quantum cryptanalysis of hidden linear functions [G]. In: Advances in Cryptology-Crypto'95, Lecture Notes in Computer Science 963. Berlin: Springer-Verlag, 1995.424 - 437
  • 9L. M. K. Vandersypen, M. Steffen, G. Breyta, et al.Experimental realization of Shor' s quantum factoring algorithm using nuclear magnetic resonance [J]. Nature, 2001, 414(6866) : 883-887
  • 10E. Artin. Theory of braids [J]. Ann. of Math. , 1947, 48(1):101 - 126

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部