首页 | 本学科首页   官方微博 | 高级检索  
     检索      

ID-based Key-insulated Authenticated Key Agreement Protocol
作者姓名:周渊  程晓明  柴震川
作者单位:National Computer Network Emergency Response Technical Team/Coordination Center of China,National Computer Network Emergency Response Technical Team/Coordination Center of China,Dept.of Computer Science and Eng. Shanghai Jiaotong Univ.,Beijing 100031,China,Beijing 100031,China,Shanghai 200030,China
摘    要:The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed.

关 键 词:密码系统  安全保证  基于身份密码学  基于密钥绝缘体制
文章编号:1007-1172(2007)02-0247-03
修稿时间:2005-12-15

ID-based Key-insulated Authenticated Key Agreement Protocol
ZHOU Yuan,CHENG Xiao-ming,CHAI Zhen-chuan.ID-based Key-insulated Authenticated Key Agreement Protocol[J].Journal of Shanghai Jiaotong university,2007,12(2):247-249.
Authors:ZHOU Yuan  CHENG Xiao-ming  CHAI Zhen-chuan
Institution:1. National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100031,China
2. Dept. of Computer Science and Eng. , Shanghai Jiaotong Univ. , Shanghai 200030, China
Abstract:The basic idea behind an ID-based cryptosystem is that end user's public key can be determined by his identity information.Comparing with the traditional certificate-based cryptography,identity-based cryptography can eliminate much of the overhead associated with the deployment and management of certificate.However,exposure of private keys can be the most devastating attack on a public key based cryptosystem since such that all security guarantees are lost.In this paper,an ID-based authenticated key agreement protocol was presented.For solving the problem of key exposure of the basic scheme,the technique of key insulation was applied and a key insulated version is developed.
Keywords:ID-based  key-insulated  key agreement
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号