RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol

被引:0
|
作者
LI Yang [1 ]
ZHU Jianming [1 ]
ZHANG Ning [1 ]
WANG Xiuli [1 ]
ZHANG Yaoqi [1 ]
机构
[1] College of Information, Central University of Finance and Economics
基金
中国国家自然科学基金;
关键词
Authenticated key agreement; ID-based; Provable security; Se CK model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
Based on revisiting the RYY+Identitybased(ID-Based) key agreement protocol, we find it’s vulnerable to Intermediate results leakage(IRL) and Keycompromise impersonation(KCI) attack. A novel protocol called RYY++is proposed to make up for its deficiencies.Our protocol follows the Full dual exponential challenge response(FDCR-1) scheme to ensure the signature change every time, so the master public key of Private key generator(PKG) joined in signature generation can guarantee two parties trust each other. The RYY++protocol is also proven to be secure in the Strengthened extended Canetti–Krawczyk(Se CK) model which provides better support for adversary’s query and has an advantage over most existing protocols on security and efficiency.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [21] An efficient identity-based tripartite authenticated key agreement protocol
    Zuowen Tan
    Electronic Commerce Research, 2012, 12 : 505 - 518
  • [22] An efficient identity-based tripartite authenticated key agreement protocol
    Tan, Zuowen
    ELECTRONIC COMMERCE RESEARCH, 2012, 12 (04) : 505 - 518
  • [23] A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 287 - 294
  • [24] Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC
    Farash, Mohammad Dabzinejad
    Attari, Mahmoud Ahmadian
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (01): : 55 - 70
  • [25] A provably secure authenticated key agreement protocol for wireless communications
    Guo, Hua
    Xu, Chang
    Mu, Yi
    Li, Zhoujun
    COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (03) : 563 - 572
  • [26] Secure and Authenticated Key Agreement Protocol with Minimal Complexity of Operations in the Context of Identity-Based Cryptosystems
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [27] Identity-based authenticated key agreement protocol based on Weil pairing
    Smart, NP
    ELECTRONICS LETTERS, 2002, 38 (13) : 630 - 632
  • [28] Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network
    Lian, Huanhuan
    Kang, Burong
    Yang, Libao
    IEEE ACCESS, 2024, 12 : 98611 - 98622
  • [29] An Improved Identity-based Authenticated Key Agreement Protocol Using Pairings
    Zhang, Jianzhong
    Wu, Zuoshun
    Li, Yong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 45 - 49
  • [30] Escrowable identity-based authenticated key agreement protocol with strong security
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1339 - 1349