Key Agreement Protocols of Non-Signature Authentication Based on Binary Tree

被引:0
|
作者
Wu F. [1 ,2 ]
Zhang H. [1 ,2 ]
机构
[1] School of Computer Science, Wuhan University, Wuhan
[2] Key Laboratory of Aerospace Information Security and Trusted Computing(Wuhan University), Ministry of Education, Wuhan
基金
中国国家自然科学基金;
关键词
Binary tree; Cryptography; Homomorphism; Protocols; Provably secure;
D O I
10.7544/issn1000-1239.2017.20160791
中图分类号
学科分类号
摘要
Protocol is the specification of the network communication. Then cryptographic protocol, whose safety is based on signature or authentication technology, is one of the key techniques of information security. The technique of signature or authentication needs huge computation during communicating, which brings barriers for many communication devices because of their limited computing power. Therefore, it is an aim of studying information security to design a secure cryptographic protocol, which is practical but doesn't need huge computation. In this paper, a novel key agreement protocol is proposed, which is based on the binary tree and the homomorphic mapping of integer multiplication. Meanwhile, an experiment is carried out in an open source (OpenSSL) systems to test how nodes of leaf binary trees affect network communication and the result of the experiment is analyzed. Our scheme is successful because our key agreement protocol is proved to be safe in the random oracle model. That is to say, in the PKI system, our key agreement protocol meets the requirement of the indistinguishable chosen plaintext attack (IND-CPA ) security. Compared with previous protocols (like MTI, MQV, HMQV), our key agreement protocol has many advantages: the computation is small; only one strong security assumption is needed; it dispenses with extra authentication of MAC and digital signature; and communicating parties can authenticate implicitly through unsafe channels. © 2017, Science Press. All right reserved.
引用
收藏
页码:2797 / 2804
页数:7
相关论文
共 23 条
  • [1] Zhang H., Han W., Lai X., Et al., Survey on cyberspace security, Scientia Scinica: Informations, 46, 2, pp. 125-164, (2016)
  • [2] Jian H., Xu Q., Advances in key techniques of practical secure multi-party computation, Journal of Computer Research and Development, 52, 10, pp. 2247-2257, (2015)
  • [3] Diffie W., Hellman M., New directions in cryptography, IEEE Trans on Information Theory, 22, 6, pp. 644-654, (1976)
  • [4] Lim C.H., Lee P.J., A key recovery attack on discrete long-based schemes using a prime order subgroup, LNCS 1294: Advances in Cryptology 1997, pp. 249-263, (1997)
  • [5] Just M., Vaudenay S., Authenticated multi-party key agreement, LNCS 1163: Advances in Cryptology 1996, pp. 36-49, (1996)
  • [6] Goss K.C., Cryptographic method and apparatus for public key exchange with authentication
  • [7] Menezes A., Qu M., Vanstone S., Some new key agreement protocols providing implicit authentication, Proc of the 2nd Workshop Selected Areas in Cryptography, pp. 89-98, (1995)
  • [8] Schneier B., Skipjack and kea algorithm specification version 2.0, (1998)
  • [9] Law L., Menezes A., Qu M., Et al., An efficient protocol for authenticated key agreement, Designs, Codes and Cryptography, 28, 2, pp. 119-134, (2003)
  • [10] Standard specifications for public-key cryptography, pp. 1-228, (2000)