信息网络安全 ›› 2015, Vol. 15 ›› Issue (11): 40-46.doi: 10.3969/j.issn.1671-1122.2015.11.007

• 技术研究 • 上一篇    下一篇

一种基于混沌映射的秘密握手协议

王闻博1, 程庆丰1,2, 陆思奇1, 赵进华3   

  1. 1. 洛阳外国语学院语言工程系,河南 洛阳 471003
    2. 中国科学院信息工程研究所信息安全国家重点实验室,北京 100093
    3. 信息保障技术重点实验室,北京 100072
  • 收稿日期:2015-08-15 出版日期:2015-11-25 发布日期:2015-11-20
  • 作者简介:

    作者简介: 王闻博(1993-),女,辽宁,硕士研究生,主要研究方向:密码学;程庆丰(1979-),男,辽宁,博士,副教授,主要研究方向:密码学;陆思奇(1990-),男,山东,硕士研究生,主要研究方向:密码学;赵进华(1981-),男,山东,副研究员,硕士,主要研究方向:信息安全。

  • 基金资助:
    信息保障技术重点实验室开放课题[KJ-13-109];信息安全国家重点实验室开放课题[2014-11];国家自然科学基金青年科学基金[61502524]

A New Secret Handshakes Scheme Based on Chaotic Maps

WANG Wen-bo1, CHENG Qing-feng1,2, LU Si-qi1, ZHAO Jin-hua3   

  1. 1. Department of Language and Engineering, Luoyang University of Foreign Languages, Luoyang Henan 471003, China
    2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    3. Science and Technology on Information Assurance Laboratory, Beijing 100072, China.
  • Received:2015-08-15 Online:2015-11-25 Published:2015-11-20

摘要:

秘密握手协议是一种在不泄露用户身份条件下进行密钥协商的隐私保护认证协议,当且仅当参与协议的双方属于同一个群时协议能够通过认证并且建立共享的会话密钥,非该群用户则无法知晓群的任何属性。文章对Pal 提出的基于ZSS签名的动态秘密握手协议进行了分析,指出该协议在用户撤销机制以及用户追踪方面等存在着一定不足。针对其存在的不足,文章首先设计了一个基于混沌映射的ZSS签名(ZSS-CM),并使用ZSS-CM签名给出了基于混沌映射的秘密握手协议SH-CM。SH-CM协议比Pal提出的协议具备更高的计算效率,并支持用户撤销和用户追踪,安全性更为完备。

关键词: 秘密握手, 混沌映射, 用户追踪, 用户撤销, 计算开销

Abstract:

The primitive secret handshake refers to a privacy-preserving authentication protocol which negotiate the session key without the leak of identity. The authentication can be passed if and only if the two participants are from the same group, after which the shared session key would be established for further communication. However those who do not belong to the group will not get any information about the group. Pal used the ZSS signature to propose a secret handshake scheme with dynamic matching, which has some drawbacks in user revocation and user tracking. This paper first modifies the ZSS signature into the chaotic map based ZSS (ZSS-CM), which is later used to construct a new secret handshake based on chaotic map (SH-CM). The SH-CM protocol costs less computing resources than the protocol proposed by Pal, meanwhile maintaining the basic security properties of secret handshakes, supporting user revocation and user tracking as well, which achieves better security.

Key words: secret handshake, chaotic map, user tracking, user revocation, computation cost

中图分类号: