高级检索

    基于短群签名的密钥交换协议设计

    Design of Key Exchange Protocol Based on Short Group Signature

    • 摘要: 本协议采用线性加密技术,在短群签名体制下实现了密钥交换,为短群签名系统加入了密钥交换阶段.典型的短群签名系统包含以下6个阶段:初始化、入网、签名、验签、身份验证和撤销, 可为群成员提供条件隐私性.本协议加入了密钥交换阶段,使短群签名系统具有保密性.该协议既可实现群成员与TA(trust authority)间的密钥交换,也可在TA的协助下,实现群成员间的密钥交换,为TA与群成员、群成员间的信息传输提供了保密性.本协议无需引入X.509证书,仅利用短群签名系统原有的参数即可完成密钥交换,既保持了短群签名的条件隐私性,也降低了系统管理的难度.本密钥交换协议仅需要两次通信,通信开销小,能降低网络延时和拥塞.安全性分析证明了该协议可抵抗篡改攻击、伪装攻击、重放攻击和中间人攻击.该协议完善了群签名体制,可为车载网络、可信计算和云计算等网络提供保密性.

       

      Abstract: A new key exchange protocol using linear encryption based on short group signature is proposed in this paper. Typically, a short group signature system includes six steps: setup, join, sign, verify, open and revocation. It can provide conditional privacy to group members. The key exchange phase is added into short group signature system so that short group signature system may offer confidentiality after the new key exchange phase. The proposed protocol could implement key exchange between TA(trust authority) and a group member. With the help of TA, the seed of session key can be exchanged between two group members according to this protocol. The following communication can be encrypted by symmetric encipherment algorithm using the exchanged key after key exchange phase. No more parameters is introduced into short group signature system by proposed protocol, which reduces the difficulty in system management. X.509 certification or PKI is unnecessary in proposed protocol, which keeps the conditional privacy of short group signature. Key is exchanged in only two communications, which reduces network delay and congestion. Security analysis proves that the proposed protocol resists tampering attack, impersonal attack, replay attack and man-in-the-middle attack. It provides confidential to short group signature system, which makes short group signature system more suitable for VANET, trust computing and cloud computing.

       

    /

    返回文章
    返回