电子学报 ›› 2008, Vol. 36 ›› Issue (7): 1368-1372.

• 论文 • 上一篇    下一篇

一种抗阻断攻击的多方密钥协商协议

郑明辉1,2, 崔国华1, 祝建华1   

  1. 1. 华中科技大学计算机科学与技术学院,湖北武汉 430074;2. 湖北民族学院信息工程学院,湖北恩施 445000
  • 收稿日期:2007-03-20 修回日期:2008-03-20 出版日期:2008-07-25 发布日期:2008-07-25

A Multi-Party Key Agreement Protocol Withstand Interrupted Attack

ZHENG Ming-hui1,2, CUI Guo-hua1, ZHU Jian-hua1   

  1. 1. School of Computer Science,Huazhong University of Science and Technology,Wuhan,Hubei 430074,China;2. School of Information Engineering,Hubei Iustitute for Nationalities,Enshi,Hubei 445000,China
  • Received:2007-03-20 Revised:2008-03-20 Online:2008-07-25 Published:2008-07-25

摘要: 一个非认证的多方密钥协商协议不能对通信参与方和消息进行认证,它必须依赖认证的网络信道或其他的认证方法.分析了Horng在认证广播信道下提出的高效多方密钥协商协议,指出它不能抵抗内部恶意参与方发起的密钥协商阻断攻击,该攻击导致通信的其他诚实参与方不能正确计算出相同的共享密钥.提出了一种安全的多方密钥协商协议,在Horng协议中加入了消息正确性的认证方法,能够检测出组内恶意参与方,并在随机预言模型下证明了提出的协议能够抵抗密钥协商阻断攻击.

关键词: 密钥协商, 离散对数问题, 阻断攻击, 随机预言模型

Abstract: A non-authenticated group key agreement protocol cannot provide participant and message authentication,thus it must depend on an authenticated network channel or use another scheme to provide authentication.This paper indicates that Horng’s group key agreement protocol which based on the authenticated broadcast channel is unable to withstand the disruption attack of malicious participants in group.This attack leads that other honest participants will not be able to correctly agree on a group key consistently.In this paper,an improved protocol is proposed.The proposed protocol which joins the message authentication method in original protocol can detect the malicious participant.Under the random oracle model,paper proves the proposed protocol can withstand the interrupted attack from malicious participant.

Key words: key agreement, discrete logarithm problem, interrupted attack, random oracle model.

中图分类号: