{"title":"针对KCI和KRA的无证书认证密钥协议","authors":"Hongtu Li, Hu Liang, Yuan Wei, Jianfeng Chu","doi":"10.1109/NCIS.2011.51","DOIUrl":null,"url":null,"abstract":"In an open and distributed environment, authenticated key agreement protocol, as an important cryptographic primitive, is used to authenticate entities and establish session key in order to provide secure communications. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we propose a new protocol based on CL-PKC. The new proposed protocol achieves most of the required security attributes. Security analysis shows that it achieves the attributes of forward secrecy, known-key secrecy, no-key control, key compromise impersonation and key replicating.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Certificateless Authenticated Key Agreement Protocol against KCI and KRA\",\"authors\":\"Hongtu Li, Hu Liang, Yuan Wei, Jianfeng Chu\",\"doi\":\"10.1109/NCIS.2011.51\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In an open and distributed environment, authenticated key agreement protocol, as an important cryptographic primitive, is used to authenticate entities and establish session key in order to provide secure communications. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we propose a new protocol based on CL-PKC. The new proposed protocol achieves most of the required security attributes. Security analysis shows that it achieves the attributes of forward secrecy, known-key secrecy, no-key control, key compromise impersonation and key replicating.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.51\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.51","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Certificateless Authenticated Key Agreement Protocol against KCI and KRA
In an open and distributed environment, authenticated key agreement protocol, as an important cryptographic primitive, is used to authenticate entities and establish session key in order to provide secure communications. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In this paper, we propose a new protocol based on CL-PKC. The new proposed protocol achieves most of the required security attributes. Security analysis shows that it achieves the attributes of forward secrecy, known-key secrecy, no-key control, key compromise impersonation and key replicating.