当前位置:主页 > 科技论文 > 信息工程论文 >

多方密钥协商协议的研究

发布时间:2019-05-27 22:23
【摘要】:随着计算机技术的快速发展,互联网时代的兴起,如何在开放网络中保证信息安全已经成为一个研究领域,该领域的核心技术是密码学。密钥协商协议是参与者在一个不确定安全的网络中,以信息交互的方式来共同产生一个保密的会话密钥,随后用对称加密机制来保障通信数据的安全,是密码学中许多的高级协议的构成基础。安全的密钥协商协议的设计重点一般是从两个方面进行考虑:分别是安全性和协议的有效性。从安全性上来讲,密钥协商协议应该要满足的基本性质:已知会话密钥安全、密钥不可控制性、抵抗密钥泄露攻击、完美前向保密性、密钥共享可知性。而从有效性上来讲,则应该考虑的是用户的通信轮数与计算量的大小。根据参与的人数,密钥协商协议一般分为双方、三方和多方密钥协商协议。而本文主要是对多方密钥协商协议进行的研究。本文的研究成果如下:1、介绍了现有的多方密钥协商协议,分析了其进行一次协议所需要的通信复杂度和计算复杂度,并分析了其是否适应成员的动态变化。2、提出了一种新的基于椭圆曲线的多方密钥协商协议方案,新的方案是PKI认证方式,使用安全单向函数而不使用双线性对映射去构造,并且对新的协议在安全性和效率方面进行了分析。3、最后结合区块链技术,提出一种新的基于区块链技术的多方密钥协商协议方案。协议引入区块链存储,对第三方可信中心的依赖降低,第三方可信中心只是公私钥的分发,防止中心作恶,使得协议过程更加安全,透明。
[Abstract]:With the rapid development of computer technology and the rise of the Internet era, how to ensure information security in open networks has become a research field, and cryptography is the core technology in this field. The key agreement protocol is that the participants together generate a confidential session key in an uncertain and secure network by means of information exchange, and then use the symmetric encryption mechanism to ensure the security of the communication data. It is the basis of many advanced protocols in cryptography. The design of secure key agreement protocol generally focuses on two aspects: security and protocol effectiveness. In terms of security, the key agreement protocol should satisfy the basic properties: known session key security, key uncontrollability, resistance to key disclosure attacks, perfect forward confidentiality, key sharing knowability. In terms of effectiveness, the number of communication wheels and the amount of computation should be considered. According to the number of participants, the key agreement is generally divided into two parties, tripartite and multi-party key agreement protocol. In this paper, the research of multi-party key agreement protocol is mainly carried out. The research results of this paper are as follows: 1, the existing multi-party key agreement protocols are introduced, the communication complexity and computational complexity required for the primary protocol are analyzed, and whether it adapts to the dynamic changes of members is analyzed. In this paper, a new multi-party key agreement protocol scheme based on Elliptic Curve is proposed. The new scheme is PKI authentication, which uses secure one-way function instead of bilinear pair mapping. The security and efficiency of the new protocol are analyzed. 3. Finally, a new multi-party key agreement protocol scheme based on block chain technology is proposed. The protocol introduces block chain storage and reduces the dependence on the third party trusted center. The third party trusted center is only the distribution of the public and private key to prevent the center from doing evil and make the protocol process more secure and transparent.
【学位授予单位】:广州大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.4

【参考文献】

相关期刊论文 前7条

1 高隆;唐春明;张永强;;基于椭圆曲线的多方密钥协商协议[J];网络与信息安全学报;2016年05期

2 袁勇;王飞跃;;区块链技术发展现状与展望[J];自动化学报;2016年04期

3 谢环;左黎明;汤鹏志;;一种基于椭圆曲线的多方密钥交换协议[J];信阳师范学院学报(自然科学版);2011年04期

4 李国民;何大可;;认证群密钥协商协议编译器的分析与改进[J];计算机工程;2009年07期

5 赵婷;王晓峰;王尚平;武晓峰;郭虎;;基于身份的可认证多方密钥协商方案[J];计算机工程;2008年06期

6 刘培;藤玲莹;佘X;周明天;;椭圆曲线密码体制的安全性分析[J];计算机工程与设计;2006年16期

7 吴开贵;吴中福;;一种安全椭圆曲线的有效构造方法[J];计算机科学;2006年04期



本文编号:2486496

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2486496.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户cc410***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com