Font Size: a A A

Research On ID-Based Authenticated Key Agreement Protocols

Posted on:2009-09-03Degree:MasterType:Thesis
Country:ChinaCandidate:T ZhaoFull Text:PDF
GTID:2178360245980089Subject:Applied Mathematics
Abstract/Summary:PDF Full Text Request
With the rapid development of the information technology and the large-scale application of the network technology, the information security is getting more and more important, and is becoming a generally concerned research topic in domestic and international computer and network application field. Key agreement is the basic element of cryptography, and it is also an important research content of information security. The establishment of session key is always critical for the people to try to communicate securely with each other through non-security channel. Therefore, research on secret-key agreement has not only important theory signification for cryptography and information security, but also crucial application value for emerging business activities in communications network. Authenticated key agreement protocol is one of the protocols which are widely used in recent years, and it has acheieved a lot of new development. However, many of them have certain security defects. In this paper, we aim at the problem that some existing key agreement protocols have some security flaws, research on ID-Based authenticated key agreement protocol, and the main works are as follows:The research and development status of key agreement protocols is analyzed, the conception, model and security features of key agreement is described.Some existing ID-Based key agreement protocols are analyzed, and some security flaws of an ID-based authenticated key agreement protocol proposed by XinJun Du is indicated; Two ID-Based authenticated multi-party key agreement schemes are proposed based on Joux's tripartite protocol. Not only the new schemes are the improvement to Xinjun Du's scheme, but also are the expansion to Joux's scheme. New schemes provide the function of multi-party key agreement, not only achieve the authentication function, but also make up for the security flaws of Du's scheme.Aiming at the security flaws of an existing ID-based key agreement protocol and a key agreement protocol for multi-trust domain proposed by Yijuan Shi which are based on the new variant mode of ID-Base public key infrastructure (PKI), an improved scheme is proposed. The new scheme can avoid excessive power of KGC to make up the security flaws in the original protocols, which has a higher level of security.
Keywords/Search Tags:key agreement, authenticated key agreement protocol, bilinear pairing, ID-Based
PDF Full Text Request
Related items