Font Size: a A A

Study Of Identity-Based Authenticated Key Exchange Protocol

Posted on:2014-03-03Degree:MasterType:Thesis
Country:ChinaCandidate:K LiFull Text:PDF
GTID:2268330401453829Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The key agreement protocol allows protocol honest participants to establish ashared session key in an open channel.Key agreement issues has been accompanied bythe development of public-key cryptography, it has become an essential problem in thecryptography research like encryption and signature. Diffie-Hellman protocol, it isfound that the protocol can not resist man-in-the-middle attack. Researchers around thesecurity of the agreement to carry out extensive and in-depth studies. However, due tothe complexity and diversity of authenticated key agreement protocol securityobjectives, how this type of security modeling and the proof of security is a verydifficult task.In this paper, on the basis of in-depth study has proposed identity-based keyagreement protocol, keeping the forefront of academic research in the field, has beenfollowing research:1. Most of the existing two-party identity-based authenticated key agreementprotocol constructed are based computational cost greatly bilinear of computing. Thispaper proposed a identity-based two-party authenticated key agreement protocol thatbased on elliptic curve discrete logarithm problem, and we proved the safety onsecurity model ID-BJM. Then, we improved the agreement, make it achieve perfectforward security and key validation security attributes.2. Based on the proposed new two-party identity-based authenticated keyagreement protocol, we extend it and obtain an identity-based tripartite authenticatedkey agreement protocol and have a formal security analysis.3. We using the GCC compiler and MIRACL cryptography library, simulation ofthe two-party identity-based authenticated key agreement protocol in the Linuxenvironment. The results of the experiment show that the new protocol proposed in thispaper is correct and feasible.
Keywords/Search Tags:Authenticated key agreement protocol, Identity-based keyagreementprotocol, Provably secure, Elliptic curve crypto-system
PDF Full Text Request
Related items