RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol

被引:0
|
作者
LI Yang [1 ]
ZHU Jianming [1 ]
ZHANG Ning [1 ]
WANG Xiuli [1 ]
ZHANG Yaoqi [1 ]
机构
[1] College of Information, Central University of Finance and Economics
基金
中国国家自然科学基金;
关键词
Authenticated key agreement; ID-based; Provable security; Se CK model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Based on revisiting the RYY+Identitybased(ID-Based) key agreement protocol, we find it’s vulnerable to Intermediate results leakage(IRL) and Keycompromise impersonation(KCI) attack. A novel protocol called RYY++is proposed to make up for its deficiencies.Our protocol follows the Full dual exponential challenge response(FDCR-1) scheme to ensure the signature change every time, so the master public key of Private key generator(PKG) joined in signature generation can guarantee two parties trust each other. The RYY++protocol is also proven to be secure in the Strengthened extended Canetti–Krawczyk(Se CK) model which provides better support for adversary’s query and has an advantage over most existing protocols on security and efficiency.
引用
下载
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [1] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [2] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [3] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [4] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [5] Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2011, 181 (19) : 4318 - 4329
  • [6] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [7] Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    INFORMATION SCIENCES, 2011, 181 (03) : 628 - 647
  • [8] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia S.
    Quan J.-X.
    Han W.-B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [9] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741
  • [10] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640