(3.227.0.150) 您好!臺灣時間:2021/05/08 10:47
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果

詳目顯示:::

我願授權國圖
: 
twitterline
研究生:郭家廸
研究生(外文):Chia-ti kuo
論文名稱:以無雙線性對為基準的無權證跨領域密鑰協商
論文名稱(外文):Certificateless Key Agreement Without Pairing for Acrossing Administrative Domains
指導教授:王永鐘
學位類別:碩士
校院名稱:國立臺北科技大學
系所名稱:電機工程系所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2013
畢業學年度:101
語文別:中文
論文頁數:38
中文關鍵詞:無權證密鑰協商跨領域無雙線性對
外文關鍵詞:CertificatelessKey AgreementAcrossing Administrative DomainsWithout Pairing
相關次數:
  • 被引用被引用:0
  • 點閱點閱:60
  • 評分評分:系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔系統版面圖檔
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
無權證公鑰密碼學解決現存密碼系統的密鑰託管問題,且用戶公鑰不需使用權證,因此非常適合通信網路的密鑰交換應用。我們發現若敵人以公開訊息的組合當作替換的公鑰,這將會使得密鑰協商不如預期的安全,在此論文我們提出無權證跨領域密鑰協商機制以解決此問題,為了降低運算複雜度,此機制以無雙線性對為基準,因此通信雙方各需6次橢圓曲線點乘運算,就可計算會話密鑰。為驗證所提機制的安全性,我們以理論證明只要通信雙方各存在一個安全的秘密訊息,則我們所提的機制是安全無慮,可以防禦公開訊息替換公鑰的攻擊。

We find an attack that use public information combination to replace public key, which lead to some certificateless key agreement scheme is not secure. In this paper, we propose a certificateless key agreement for acrossing administrative domains without bilinear pairing to resolve the above problem. Our scheme is secure as long as each user has at least one secure secret. Our scheme proposes that each user needs 6 times of elliptic curve scalar multiplication for computing session key, and it can resist attack that use public information combination to replace public key.

目 錄

中文摘要 i
英文摘要 ii
誌謝 iii
目錄 iv
表目錄 vi
圖目錄 vii
第一章 緒論 1
第二章 背景資料 3
2.1 橢圓曲線簡介 3
2.2 計算困難問題 7
2.3 無證書公開金鑰密碼學簡介 8
第三章 安全模型 9
第四章 無權證跨領域密鑰協商之設計 13
第五章 安全模型之證明 17
5.1 H_2資料庫查詢 18
5.2 會話密鑰檢查 20
5.3 證明流程 21
第六章 機制分析及比較 26
6.1 公開訊息替換公鑰攻擊 26
6.1.1 公開訊息替換公鑰攻擊之例子1 26
6.1.2 公開訊息替換公鑰攻擊之例子2 28
6.1.3 防禦方法 30
6.2 安全屬性及計算成本的比較 30
6.3 相關應用 33
第七章 結論 34
參考文獻 35


參考文獻
[1]C. Adams and S. Lloyd. Understanding Public-Key Infrastructure - Concepts, Standards, and Deployment Considerations, Indianapolis: Macmillan Technical Publishing, 1999
[2]A. Shamir. "Identity-based cryptosystems and signature schemes," Advances in Cryptology, 1984, pp. 47-53.
[3]S. S. Al-Riyami and K. G. Paterson, "Certificateless public key cryptography, " ASIACRYPT 2003, Taipei, Taiwan, 2003, LNCS 2894,pp. 452&;#8722;473.
[4]J. Baek, R. Safavi-Naini and W. Susilo, "Certificateless public key encryption without pairing," 8th Information Security Conference, Singapore, 2005, pp. 134-148.
[5]D. H. Yum and P. J. Lee, "Generic Construction of Certificateless Signature," 9th Australasian Conference Information Security and Privacy, Sydney, Australia, 2004, pp.324-337.
[6]M. H. Au, J. Chen, J. K. Liu, Y. Mu, D. S. Wong and G. Yang, "Malicious KGC attack in certificateless cryptography," ACM Symposium on Information, Computer and Communications Security, New York, 2007, pp.302-311.
[7]B. C. Hu, D. S. Wong, Z. Zhang and X. Deng, "Key Replacement Attack Against A Generic Construction Of Certificateless Signature," 11th Australasian Conference Information Security and Privacy, Melbourne, Australia, 2006, pp.235-246.
[8]張福泰,孫銀霞,張磊,耿曼曼,李素娟,「無證書公鑰密碼體制研究」,軟件學報,第二十二卷,第六期,2011,第1316-1332頁。
[9]C. M. Swanson, Security in Key Agreement: Two-Party Certificateless Schemes, Master Thesis, University of Waterloo, Waterloo Ontario Canada, 2008.
[10]G. Lippold, C. Boyd and N. Gonzalez, "Strongly secure certificateless key agreement, " The third International Conference on Pairing-based Cryptography (Pairing 2009), Palo Alto, CA, USA, 2009, LNCS 5671, pp. 206-230.
[11]M. Chen, K. Wu, J. Du and J. Xu, "A Certificateless and Across Administrative Domains Authenticated Key Exchange Scheme for E-payment," Journal of Software, vol. 6, no. 10, 2011, pp. 1985-1992.
[12]張煥國等譯,橢圓曲線密碼學導論,北京:電子工業出版社,2005。
[13]吳鋌,董軍武,王明強譯,橢圓曲線及其在密碼學中的應用-導引,北京:科學出版社,2007。
[14]L. C. Washington, Elliptic curves number theory and cryptography, Boca Raton: Taylor &; Francis Group, 2008.
[15]S. D. Galbraith, K. Harrison and D. Soldera, "Implementing the Tate pairing," In Algorithmic Number Theory 5th International Symposium, Australia, 2002, pp. 324-337.
[16]D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley and W. Polk, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," RFC5280, http://www.ietf.org/rfc/rfc5280.txt, 2009.
[17]唐洋,常友渠,徐倩,「無雙線性對的無權證隱式認證及密鑰協商」,計算機工程與應用,第四十八卷,第十五期,2012,第83-87頁。
[18]Y. J. Kim, J. G. Kang, C. h. Kim and Y. M. Kim, "An efficient pairing-free certificateless two-party authenticated key agreement protocol in the eCK model," arXiv.org, arXiv:1304.0383, 2013.
[19]R. Guo, Q. Wen, Z. Jin and H. Zhang , "An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor Networks," The Scientific World Journal, doi: 10.1155/2013/761240, 2013.
[20]劉小瓊,潘進,李國朋,「基於無證書的雙方跨域認證密鑰協商協議」計算機應用研究,第二十九卷,第二期,2012,第646-649頁。
[21]M. Geng and F. Zhang, "Provably secure certificateless two-party authenticated key agreement protocol without pairing, "International Conference on Computational Intelligence and Security, vol.2, 2009, pp. 208-212.
[22]L. Zhang, F. Zhang and Q. Wu, "Simulatable certificateless two-party authenticated key agreement protocol," Information Sciences, vol.180, no.6, 2010, p.p. 1020–1030.
[23]劉文浩,許春香,「無證書雙方密鑰協商方案」,軟件學報,第二十二卷,第十一期,2011,第2843-2852頁。
[24]D. He, S. Padhye and J. Chen, "An efficient certificateless two-party authenticated key agreement protocol," Computers and Mathematics with Applications, vol.64, no.6, 2012, pp.1914-1926.
[25]J. Liu, Z. Zhang, R. Sun and K. S. Kwak, "An Efficient Certificateless Remote Anonymous Authentication Scheme for Wireless Body Area Networks," International Conference on Communications, Ottawa, ON, 2012, pp.3404-3408.
[26]唐洋,常友渠,徐倩,「基於智能卡的無證書離線電子現金方案」計算機應用研究,第二十九卷,第三期,2012,第1095-1110頁。
[27]Z. Xu, X. Liu, G. Zhang, W. He, G. Dai and W. Shu, "A certificateless signature scheme for mobile wireless Cyber-Physical Systems," The 28th International Conference on Distributed Computing Systems Workshops, Beijing, 2008, pp. 489-494.
[28]M. Zhang, C. Pei and L. Dang, "Efficient Mobile IP Registration in Certificateless Signature," 24th International Conference on Advanced Information Networking and Applications Workshops, Perth, WA, 2010, pp.363-366.
[29]Z. Zhang, W. Susilo and R. Raad, "Mobile Ad-hoc Network Key Management with Certificateless Cryptography," International Conference on Signal Processing and Communication Systems, Gold Coast, Australia, 2008, pp.1-10.
[30]C. Dario, F. Dario and G. Rosario, "Certificateless Onion Routing," 16th ACM conference on Computer and communications security, New York, 2009, pp.151-160.


QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
系統版面圖檔 系統版面圖檔