Font Size: a A A

Research On The Authenticated Group Key Agreement Protocol

Posted on:2018-03-12Degree:MasterType:Thesis
Country:ChinaCandidate:H H ChenFull Text:PDF
GTID:2348330542460077Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In order to achieve a secure session,participants often need to form a session key through the method of key establish,the temporary,fresh key is used for subsequent communication.There are usually two ways to create a key.One is the key allocation,which requires a trusted third party to get the session key,although the operation is simple,it requires a third party with higher cost.Key agreement is an another important means of key generation,the biggest advantage of this approach is all participants through fair communication process to get the session key,without having to depend on the third party.This kind of key is established in a fair and simple way,and the participating parties need not trust other participants and have a strong practicability.The key agreement protocol has become a hot topic in recent years.According to the number of participants,key agreement can be divided into three categories:the two parties,the three parties and the group key agreement.This paper focuses on the research of group key agreement protocol and completes the following three aspects:1)Summarizing the basic design principles of key agreement.Firstly,reliability should be ranked first and not performance;Secondly,it is important to minimize the cost of using time stamps.In addition,the design protocol should minimize the security assumptions,and only such an agreement can be applied to the actual environment.2)A new group key agreement protocol is proposed based on the non-certificate public key cryptosystem and the elliptic curve cryptosystem,and then the security of the new protocol is strictly formalized.Considering the performance is also a key point to determine whether the key agreement protocol can be applied,a few classical key agreement protocols are selected to carry out the horizontal comparison.The results show that because the new protocol adopts bilinear function,the computation of the key agreement phase is reduced obviously.This protocol can be used in a communication environment that is limited in computing space,storage space,and bandwidth.3)Proposing an identity-based authentication group key agreement protocol.In this agreement,each participant is able to validate the incoming messages through an authenticated authentication structure.The protocol does not need to verify the participant's public key certificate.For this agreement,a sub-protocol for entering or leaving the group is specifically proposed,which makes the new protocol fit for the organization of the change of membership.
Keywords/Search Tags:Cryptographic protocol, Key agreement protocol, Provable security, Certificateless authenticated group key agreement, Key agreement
PDF Full Text Request
Related items