计算机科学 ›› 2020, Vol. 47 ›› Issue (6A): 413-419.doi: 10.11896/JsJkx.191100216

• 信息安全 • 上一篇    下一篇

一种基于无证书的SIP认证密钥协商协议

莫天庆1, 何咏梅2   

  1. 1 武警重庆总队通信大队 重庆 404100;
    2 武警西藏总队通信大队 拉萨 850000
  • 发布日期:2020-07-07
  • 通讯作者: 莫天庆(motianqing11@163.com)

SIP Authentication Key Agreement of Protocol Based on Certificateless

MO Tian-qing1 and HE Yong-mei2   

  1. 1 Communication Regiment of PAP Chongqing Corps,Chongqing 404100,China
    2 Communication Regiment of PAP Xizang Corps,Lhasa 850000,China
  • Published:2020-07-07
  • About author:MO Tian-qing, born in 1986, network engineer.Her main research interests include information security and cryptography.

摘要: 针对现有SIP(会话初始协议)认证机制不能抵抗临时秘密泄露攻击和系统开销大的问题,提出了一种基于改进SIP协议的SIP安全认证模型。借鉴原有协议流程,设计了一种强安全的SIP两方匿名认证密钥协商子协议。新协议利用无证书签密的特性实现通信实体的双向认证、密钥协商和不可追踪。在现有seCK(不仅包含eCK模型,而且捕捉了临时中间泄露抵抗的安全性)模型下对新协议进行了安全性证明,其安全性被规约为多项式时间敌手求解CDH问题。与现有同类协议相比,新协议只需7次点乘运算和3次消息交互,具有安全性更强、计算和通信开销较低的特点。

关键词: SIP, 可证明安全, 认证密钥协议, 无证书签密

Abstract: The existing authentication schemes for SIP do not resist the attack of ephemeral secrets reveal,and have high system costs.A safe communicated model of SIP network based on improved SIP was proposed.Basing on the primary flow of SIP and combing with certificateless signcryption,a new anonymous two-party authenticated key agreement protocol was adopted to achieve mutual authentication and unlinkability.Furthermore,the new protocol is provably secure in the seCK model under the CDH assumption.Comparative analysis results show that our protocol is very simple and efficient.

Key words: Authentication key agreement, Certificateless signcryption, Provably secure, SIP

中图分类号: 

  • TP393
[1] DONG Q,LUO G M,ZHU L.Research on SIP based key distribution method of private mobile communication system.Command Control &Simulation.http://kns.cnki.net/kcms/detail/32.1759.TJ.20191218.1203.004.html.2019.12.
[2] PAN W B.The Security Research of Core Network Protocol Based on Voip.BeiJing: BeiJing University of Posts and Telecommunicatons,2018.
[3] SI D F,HAN X H,LONG Q,et al.A Survey on the Core Technique and Research Development in SIP Standard.Journal of Software,2005,16(2):239-249.
[4] GUO Z H,LIU B C.Research and design of improved SIP-based authentication mechanism.Study on Optical Communications,2013,180(6):8-11.
[5] JIANG H,PAN W J,HU R L.Design of SIP AuthenticationScheme Based on Ring Signature.Computer Technology and Development,2016,26(3):140-143.
[6] ZHANG ZX,FANG B X,ZHANG H L,et al.Safe comunicated model of SIP network based on improved SIP protocol.Journal on Communication,2007,28(12):39-46.
[7] WEI Z M,FENG J C.Study on Security Authentication Mechanism for SIP.Computer Science,2008,35(11):95-97.
[8] LIU J M,GAO L J,LU G Y.Voip authentication and encryptionsystem based on SIP.Journal of Xi’an University of Posts and Telecommunications,2016,21(4):14-18.
[9] CAO Y.SIP Authentication Key Agreement Protocol Based on ECDLP.Computer Systems & Applications,2016,25(3):225-228.
[10] WEN Y Y,LUO M,ZHAO H.Research and implementation of a signcryption-based security mechanism in VoIP network.Journal on Communication,2010,31(4):8-15.
[11] LI X W.Research on Provably Secure Authenticated KeyAgreement Protocol.Xi’an: Xidian University,2013.
[12] NI L.Research on Some Issues in Authenticated Key Agreement Protocols.Shanghai: Shanghai Jiao Tong University,2012.
[13] SHU J.Design and Analysis of Authenticated Key ExchangeProtocols.Chengdu: University of Electronic Science and Technology of China,2010.
[14] SUN H Y.Authenticated Key Agreement Protocol and ITS Applications.BeiJing: BeiJing University of Posts and Telecommunicatons,2014.
[15] ZHOU Y W,YANG B,ZHANG W Z.An Improved Two-party Authenticated Certificateless Key Agreement Protocol.Chinese Journal of Computers,2017,40(5):1181-1190.
[1] 张振超, 刘亚丽, 殷新春.
适用于物联网环境的无证书广义签密方案
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment
计算机科学, 2022, 49(3): 329-337. https://doi.org/10.11896/jsjkx.201200256
[2] 倪亮, 王念平, 谷威力, 张茜, 刘伎昭, 单芳芳.
基于格的抗量子认证密钥协商协议研究综述
Research on Lattice-based Quantum-resistant Authenticated Key Agreement Protocols:A Survey
计算机科学, 2020, 47(9): 293-303. https://doi.org/10.11896/jsjkx.200400138
[3] 张奇文, 王志强, 张逸谦.
基于Gossip协议的信任收集共识算法研究
Trust Collection Consensus Algorithm Based on Gossip Protocol
计算机科学, 2020, 47(6A): 391-394. https://doi.org/10.11896/JsJkx.191000051
[4] 任仪.
基于区块链与人工智能的网络多服务器SIP信息加密系统设计
Design of Network Multi-server SIP Information Encryption System Based on Block Chain and Artificial Intelligence
计算机科学, 2020, 47(6A): 634-638. https://doi.org/10.11896/JsJkx.190600075
[5] 张仕将,柴晶,陈泽华,贺海武.
基于Gossip协议的拜占庭共识算法
Byzantine Consensus Algorithm Based on Gossip Protocol
计算机科学, 2018, 45(2): 20-24. https://doi.org/10.11896/j.issn.1002-137X.2018.02.004
[6] 林旺,田洪现.
基于SIP协议的嵌入式VoIP语音终端实现和协议分析
Implementation and Protocol Analysis of Embedded VoIP Voice Terminal Based on SIP
计算机科学, 2016, 43(6): 86-90. https://doi.org/10.11896/j.issn.1002-137X.2016.06.018
[7] 姜頔,韩益亮.
适用于移动网络的属性基在线/离线签密方案
Attribute-based Online/Offline Signcryption for Mobile Network
计算机科学, 2016, 43(11): 221-225. https://doi.org/10.11896/j.issn.1002-137X.2016.11.043
[8] 陈宾,马大玮,尹才华,江雪银.
基于SIP的无线网络移动性管理研究与OPNET仿真
Research on Wireless Networks Mobility Management and OPNET Simulation Based on SIP
计算机科学, 2015, 42(Z11): 289-291.
[9] 张恩,孙权党,刘亚鹏.
抗合谋理性多秘密共享方案
Collusion-free Rational Multi-secret Sharing Scheme
计算机科学, 2015, 42(10): 164-169.
[10] 张襄松,刘振华.
具有消息恢复功能的无陷门格签名方案
Non-trapdoors Lattice Signature Scheme with Message Recovery
计算机科学, 2014, 41(9): 165-168. https://doi.org/10.11896/j.issn.1002-137X.2014.09.031
[11] 刘靖,叶新铭,马元飞.
基于时间着色Petri网的SIP协议验证与分析
Verification and Analysis of SIP Protocol Based on Timed Colored Petri Nets
计算机科学, 2014, 41(7): 122-129. https://doi.org/10.11896/j.issn.1002-137X.2014.07.025
[12] 张国印,李军,王向辉,徐国坤.
一种基于移动P2P改进的Gossip算法
Improved Gossip Algorithm Based on Mobile P2P Networks
计算机科学, 2013, 40(9): 103-105.
[13] 孙 瑾,胡予濮.
基于身份的新型广播签密方案
Novel Identity Based Broadcast Signcryption Scheme
计算机科学, 2013, 40(2): 124-128.
[14] 陶文君,胡斌.
一个可抵抗临时指数泄露的密钥协商协议形式化安全模型
Formal Security Model Resist ing Session Exponential Reveal for Key Agreement Protocol
计算机科学, 2013, 40(11): 98-102.
[15] 孙华,郑雪峰.
一种可证明安全的有效无证书签密方案
Provably Secure and Efficient Certificateless Signcryption Scheme
计算机科学, 2013, 40(11): 112-116.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!