Font Size: a A A

Research On Efficient Identity-based Authenticated Key Agreement Protocol Based On Pairings

Posted on:2021-02-12Degree:MasterType:Thesis
Country:ChinaCandidate:L MengFull Text:PDF
GTID:2428330614959251Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Session key agreement protocol refers to the symmetric key generated by two or more entities on the public channel before the formal communication.Session key agreement protocol directly affects the security of symmetric keys.Compared with the identity-based authenticated key agreement protocol without pairings,the identity-based authenticated key agreement protocol based on pairings has prominent advantages in security,but it also has disadvantages in computational efficiency due to the large number of pairings needed.Therefore,it is of great significance for the security and efficiency of network communication to study the identity-based authenticated key agreement protocol with high computational efficiency and high comprehensive performance.Based on in-depth analysis and summary of relevant research results at home and abroad,this thesis improves the current identity-based authenticated key agreement protocol based on pairings.The main work and innovations of this thesis are as follows:1.In an effort to overcome shortcomings of the current identity-based authenticated key agreement protocol based on pairings in computational efficiency,the existing key agreement protocol is improved.The improved protocol redesigns some parts of the protocol.Some secret parameters that need to be computed by both two entities are changed to be computed by PKG(Private Key Generator)and taken as public parameters,and thus can reduce the computation of both two entities.The ID-BJM model was used to prove the security of the improved protocol,the result show that the improved protocol is a secure key agreement protocol in ID-BJM model.Finally,the simulation experiments are used to compare and analyze the improved protocol.The results show that the computation time of the improved protocol is decreased by about 11%.2.Aiming at the problem that the improved protocol in work 1 does not satisfy the requirement of ephemeral secrets reveal resistance.By bringing part of private keys of both entities into the sharing key,the new improved protocol can satisfy requirement of ephemeral secrets reveal resistance at the cost of computational efficiency.The e CK model was used to prove the security of the new improved protocol,the results show that the new improved protocol is a secure key agreement protocol in e CK model.Simulation experiments are used to compare and analyze the new improved protocol.The results show that the computational efficiency of the improved protocol is increased by about 19.6% and the communication traffic is reduced by 1/3 while comparing with these protocols which have same security attributes.
Keywords/Search Tags:key agreement protocol, pairings, computational efficiency, communication traffic
PDF Full Text Request
Related items