计算机工程与应用 ›› 2025, Vol. 61 ›› Issue (5): 279-288.DOI: 10.3778/j.issn.1002-8331.2311-0085

• 网络、通信与安全 • 上一篇    下一篇

面向智能电网的安全两方认证密钥协商协议研究

赵磊,罗维,马玉龙,洪海敏,王逸民   

  1. 1.国网江苏省电力有限公司 营销服务中心,南京 210000
    2.西安邮电大学 网络空间安全学院,西安 710121
    3.深圳市国电科技通信有限公司,广东 深圳 518109
  • 出版日期:2025-03-01 发布日期:2025-03-01

Research on Secure Two-Party Authentication Key Agreement Protocol for Smart Grid

ZHAO Lei, LUO Wei, MA Yulong, HONG Haimin, WANG Yimin   

  1. 1.Marketing Service Center, State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210000, China
    2.School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
    3.Shenzhen Guodian Technology Communication Co., Ltd., Shenzhen, Guangdong 518109, China
  • Online:2025-03-01 Published:2025-03-01

摘要: 在智能电网SG(smart grid)中设备间的认证和安全通信是至关重要的。然而现有的认证密钥协商协议中,智能电表和服务提供商的密钥完全由可信第三方生成,若第三方遭受攻击则会导致系统中所有用户的私钥泄露。为解决上述问题,提出了一种安全增强的两方认证密钥协商协议,即使可信第三方遭受攻击也不会泄露其他用户的私钥。在该协议中,可信第三方仅为智能电表和服务提供商生成部分密钥,智能电表和服务提供商自身生成完整的私钥,进一步相互认证建立秘密会话密钥,保证通信安全,防止隐私数据泄露。该协议在CDH(computational Diffie-Hellman)问题假设下是可证安全的,同时协议具有前向安全性和身份匿名性。最后,通过理论分析和实验仿真表明,协议在认证密钥协商阶段的计算开销和通信开销方面具有一定的优势。

关键词: 智能电网, 认证密钥协商, 椭圆曲线, 双线性对, 部分密钥

Abstract: Authentication and secure communication between devices in a smart grid (SG) are essential. However, in the existing authentication key agreement protocols, the keys of smart meters and service providers are completely generated by a trusted third party. If the third party is attacked, the private keys of all users in the system will be leaked. To solve the above problems, this paper proposes a security enhanced two-party authentication key agreement protocol, which will not reveal other users’private keys even if a trusted third party is attacked. In this protocol, the trusted third party only generates partial keys for smart meters and service providers, while smart meters and service providers themselves generate complete private keys to further authenticate and establish secret session keys to ensure communication security and prevent privacy data leakage. The proposed protocol is provably secure under the assumption of CDH (computational Diffie-Hellman) problem, while the proposed protocol has forward security and identity anonymity. Finally, through theoretical analysis and experimental simulation, it is shown that the proposed protocol has certain advantages in the calculation cost and communication cost of the authentication key agreement stage.

Key words: smart grid, authentication key agreement, elliptic curve, bilinear pairing, partial key