电子学报 ›› 2016, Vol. 44 ›› Issue (1): 14-20.DOI: 10.3969/j.issn.0372-2112.2016.01.003

• 学术论文 • 上一篇    下一篇

可证明安全的基于位置的Prover-to-Prover密钥交换协议

张俊伟, 陈治平, 马建峰, 杨力   

  1. 西安电子科技大学计算机学院, 陕西西安 710071
  • 收稿日期:2014-07-01 修回日期:2014-11-15 出版日期:2016-01-25
    • 作者简介:
    • 张俊伟 男,1982年2月生于陕西西安.博士,西安电子科技大学副教授,主要研究方向为网络与信息安全、密码学等. E-mail:jwzhang@xidian.edu.cn 陈治平 男,1990年2月生于安徽阜阳.西安电子科技大学硕士研究生,主要研究方向为无线网络安全.
    • 基金资助:
    • 长江学者和创新团队发展计划 (No.IRT1078); 国家科技重大专项 (No.2011ZX03005-002); 国家自然科学基金 (No.U1135002,No.61100230,No.61100233,No.61202389,No.61202390,No.61372075,No.61472310); 中央高校基本科研业务费 (No.JY10000903001,No.K5051303003)

Provably Secure Position-Based Prover-to-Prover Key Exchange Protocols

ZHANG Jun-wei, CHEN Zhi-ping, MA Jian-feng, YANG Li   

  1. School of Computer Science and Technology, Xidian University, Xi'an, Shaanxi 710071, China
  • Received:2014-07-01 Revised:2014-11-15 Online:2016-01-25 Published:2016-01-25

摘要:

本文针对两个证明者之间可证明安全的基于位置密钥交换协议展开研究.首次将基于位置密钥交换分为P2V(Prover-to-Verifier)模式和P2P(Prover-to-Prover)模式,并给出P2P模式下基于位置密钥交换的安全定义.随后,在1维空间下设计了可证明安全的基于位置P2P密钥交换协议P2PKE1,并以此为基础构造了d(1≤d≤3)维空间下基于位置P2P密钥交换协议P2PKEd.同时,分别提出了具有密钥确认性质的基于位置P2P密钥交换协议P2PKEd-c和无密钥托管的基于位置P2P密钥交换协议P2PKEd-e.最后,从安全性和效率两方面对所设计的协议进行了讨论.

关键词: P2P, 基于位置密钥交换, BRM模型, 可证明安全

Abstract:

This paper investigates provably secure position-based key exchange protocols between two provers.To begin with, this paper presents the notions of the prover-to-verifier mode and the prover-to-prover mode, which is the first to distinguish between the two modes for position-based key exchange.At the same time, this paper formalizes the definition of secure prover-to-prover position-based key exchange.Then, a provably secure prover-to-prover position-based key exchange protocol P2PKE1 in 1-dimension is proposed in this paper.Based on the above protocol, a generic prover-to-prover position-based key exchange protocol P2PKEd in d-dimensions is constructed(1≤d≤3).In addition, this paper extends the proposed protocol and proposes protocol P2PKEd-c with key confirmation and protocol P2PKEd-e without key escrow in d-dimensions.Finally, we discuss the proposed protocols in 3-dimensions from both security and performance perspectives.

Key words: prover-to-prover, position-based key exchange, bounded retrieval model, provable security

中图分类号: