机构地区: 西安电子科技大学通信工程学院综合业务网理论与关键技术国家重点实验室
出 处: 《通信学报》 2008年第12期16-21,共6页
摘 要: 对基于身份的标准模型下可证明安全的认证密钥协商协议进行安全性分析,发现恶意的密钥生成中心(PKG,private key generator)能计算出所有的会话密钥,即它在无会话密钥托管模式下不满足PKG前向安全性。因此,为满足无托管的要求,提出一个改进的基于身份的认证密钥协商协议,并在标准模型下证明其为安全的认证密钥协商协议。结果表明,改进后协议满足完善前向安全性和PKG前向安全性。 The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed session keys, that is, it doesn't provide PKG-forward secrecy in escrowless mode. To satisfy the security requirement in escrowless mode, an improved version of the protocol was presented and it was proved to be a secure authenticated key agreement in the standard model. Results show that it provides perfect forward secrecy and PKG-forward secrecy.
关 键 词: 基于身份的认证密钥协商 完善前向安全性 前向安全性 标准模型