원문정보
초록
영어
In order to resist to active attacks, Chen Jiaqi has proposed an authenticated noncertificate
three-party key negotiation protocol in 2010, but this key protocol cannot
resist to passive attacks or meet the requirements for some security attributes mentioned
in his paper. In order to solve the above problems, He De-biao has proposed a new
authenticated non-certificate three-party key negotiation protocol on the basis of noncertificate
two-party key negotiation protocol. The results of the security analysis and the
efficiency analysis of the new protocol show that the new protocol can meet the security
requirements of the authenticated non-certificate three-party key negotiation protocol.
Compared with the protocol proposed by Chen Jiaqi, the new protocol has less bilinear
pairings and higher calculation efficiency.
목차
1. Introduction
2. Authenticated Non-certificate Three-party Key Negotiation Protocol
3. Attack to Non-certificate Three-party Key Negotiation Protocol
3.1. Passive Attack
3.2. Dissatisfaction of Forward Security
3.3. Dissatisfaction of Known Session Security
3.4. Irresistibility to Key Exposure Impersonation Attack
4. New Authenticated Non-certificate Three-party Key Negotiation Protocol
4.1. Non-certificate Three-party Key Negotiation Protocol for Single KGC
4.2. Non-certificate Three-party Key Negotiation Protocol for Multi-KGC
5. Security and Efficiency Analysis of New Protocol
5.1. Security Analysis
5.2. Performance Analysis
6. Conclusion
References