• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于 Shamir 秘密共享和 HMAC 认证的集中式门限密钥生成协议。

Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.

机构信息

Mixed-Signal Integrated System Lab (MSIS), School of Electronics Engineering, Chungbuk National University, Cheongju 28644, Korea.

Electronics Research Institute (ERI), El Nozha, Cairo 12622, Egypt.

出版信息

Sensors (Basel). 2022 Jan 3;22(1):331. doi: 10.3390/s22010331.

DOI:10.3390/s22010331
PMID:35009873
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC8749701/
Abstract

Many group key management protocols have been proposed to manage key generation and distribution of vehicular communication. However, most of them suffer from high communication and computation costs due to the complex elliptic curve and bilinear pairing cryptography. Many shared secret protocols have been proposed using polynomial evaluation and interpolation to solve the previous complexity issues. This paper proposes an efficient centralized threshold shared secret protocol based on the Shamir secret sharing technique and supporting key authentication using Hashed Message Authentication Code Protocol (HMAC). The proposed protocol allows the group manager to generate a master secret key for a group of n vehicles and split this key into secret shares; each share is distributed securely to every group member. t-of-n vehicles must recombine their secret shares and recover the original secret key. The acceptance of the recovered key is based on the correctness of the received HMAC signature to verify the group manager's identity and ensure the key confidentiality. The proposed protocol is unconditionally secure and unbreakable using infinite computing power as t, or more than t secret shares are required to reconstruct the key. In contrast, attackers with t-1 secret shares cannot leak any information about the original secret key. Moreover, the proposed protocol reduces the computation cost due to using polynomial evaluation to generate the secret key and interpolation to recover the secret key, which is very simple and lightweight compared with the discrete logarithm computation cost in previous protocols. In addition, utilizing a trusted group manager that broadcasts some public information is important for the registered vehicles to reconstruct the key and eliminate secure channels between vehicles. The proposed protocol reduces the communication cost in terms of transmitted messages between vehicles from 2(t-1) messages in previous shared secret protocols to zero messages. Moreover, it reduces the received messages at vehicles from 2t to two messages. At the same time, it allows vehicles to store only a single secret share compared with other shared secret protocols that require storage of t secret shares. The proposed protocol security level outperforms the other shared secret protocols security, as it supports key authentication and confidentiality using HMAC that prevents attackers from compromising or faking the key.

摘要

许多群组密钥管理协议已经被提出,用于管理车载通信的密钥生成和分发。然而,由于复杂的椭圆曲线和双线性配对密码学,大多数协议都存在较高的通信和计算成本。许多共享秘密协议已经被提出,使用多项式评估和插值来解决以前的复杂性问题。本文提出了一种基于 Shamir 秘密共享技术的高效集中式门限共享秘密协议,并支持使用哈希消息认证码协议 (HMAC) 进行密钥认证。该协议允许群组管理器为一组 n 辆车辆生成主密钥,并将该密钥分割成秘密份额;每个份额都安全地分发给每个群组成员。t-of-n 辆车必须重新组合他们的秘密份额并恢复原始密钥。恢复密钥的接受基于接收到的 HMAC 签名的正确性,以验证群组管理器的身份并确保密钥机密性。该协议在使用无限计算能力的情况下是无条件安全和不可破解的,即需要 t 个或更多的秘密份额才能重建密钥。相比之下,攻击者拥有 t-1 个秘密份额,无法泄露任何关于原始秘密密钥的信息。此外,由于使用多项式评估生成密钥和插值恢复密钥,该协议降低了计算成本,这与以前协议中的离散对数计算成本相比非常简单和轻量级。此外,利用信任的群组管理器广播一些公共信息对于注册车辆重建密钥和消除车辆之间的安全通道非常重要。该协议在车辆之间传输的消息数量上降低了通信成本,从以前的共享秘密协议中的 2(t-1)条消息减少到零条消息。此外,它将车辆接收的消息数量从 2t 减少到两条消息。同时,与需要存储 t 个秘密份额的其他共享秘密协议相比,它允许车辆仅存储单个秘密份额。与其他共享秘密协议相比,该协议的安全性更高,因为它支持使用 HMAC 进行密钥认证和机密性,这可以防止攻击者篡改或伪造密钥。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2295/8749701/a470a0d4d7f8/sensors-22-00331-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2295/8749701/a470a0d4d7f8/sensors-22-00331-g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2295/8749701/a470a0d4d7f8/sensors-22-00331-g008.jpg

相似文献

1
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication.基于 Shamir 秘密共享和 HMAC 认证的集中式门限密钥生成协议。
Sensors (Basel). 2022 Jan 3;22(1):331. doi: 10.3390/s22010331.
2
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks.车载自组织网络中的安全基于假名的条件隐私保护认证方案。
Sensors (Basel). 2022 Feb 22;22(5):1696. doi: 10.3390/s22051696.
3
An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP.基于 SOME/IP 的车载网络认证与安全通信方案
Sensors (Basel). 2022 Jan 14;22(2):647. doi: 10.3390/s22020647.
4
Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based On the Bilinear Pairing Cryptography for 5G-V2X.基于双线性配对密码学的 5G-V2X 的多区域认证和隐私保护协议(MAPP)。
Sensors (Basel). 2021 Jan 19;21(2):665. doi: 10.3390/s21020665.
5
A Secure and Efficient Group Key Agreement Scheme for VANET.车联网中的安全高效群组密钥协商方案
Sensors (Basel). 2019 Jan 24;19(3):482. doi: 10.3390/s19030482.
6
A Secure Blockchain-Based Authentication and Key Agreement Scheme for 3GPP 5G Networks.基于区块链的安全认证和密钥协商方案用于 3GPP5G 网络。
Sensors (Basel). 2022 Jun 15;22(12):4525. doi: 10.3390/s22124525.
7
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.基于量子密钥分发网络和密码认证秘密共享的不可破解分布式存储。
Sci Rep. 2016 Jul 1;6:28988. doi: 10.1038/srep28988.
8
Lightweight Anonymous Authentication and Key Agreement Protocol Based on CoAP of Internet of Things.基于物联网 CoAP 的轻量级匿名认证和密钥协商协议。
Sensors (Basel). 2022 Sep 22;22(19):7191. doi: 10.3390/s22197191.
9
ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing.ECA-VFog:一种用于 5G 辅助车联网雾计算的高效无证书认证方案。
PLoS One. 2023 Jun 23;18(6):e0287291. doi: 10.1371/journal.pone.0287291. eCollection 2023.
10
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography.基于哈希链密码学的V2X安全协议对比实验
Sensors (Basel). 2020 Oct 8;20(19):5719. doi: 10.3390/s20195719.

引用本文的文献

1
An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing.一种基于冷热区块和阈值秘密共享的区块链数据优化加密存储方案
Entropy (Basel). 2024 Aug 15;26(8):690. doi: 10.3390/e26080690.
2
Security Requirements and Challenges of 6G Technologies and Applications.6G 技术与应用的安全需求与挑战。
Sensors (Basel). 2022 Mar 2;22(5):1969. doi: 10.3390/s22051969.

本文引用的文献

1
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks.一种基于哈希链密钥生成的密钥管理协议,用于保障LoRaWAN网络安全。
Sensors (Basel). 2021 Aug 30;21(17):5838. doi: 10.3390/s21175838.
2
Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based On the Bilinear Pairing Cryptography for 5G-V2X.基于双线性配对密码学的 5G-V2X 的多区域认证和隐私保护协议(MAPP)。
Sensors (Basel). 2021 Jan 19;21(2):665. doi: 10.3390/s21020665.
3
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography.
基于哈希链密码学的V2X安全协议对比实验
Sensors (Basel). 2020 Oct 8;20(19):5719. doi: 10.3390/s20195719.