A Two-Party Identity-Based Key Agreement Protocol with Explicit Authentication

被引:0
|
作者
Yang, Haomin [1 ]
Zhang, Yaoxue [1 ]
Zhou, Yuezhi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
key agreement; identity-based cryptography; explicit authenticaito; data signature; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-message two-party key agreement protocol with explicit authentication provides perfect forward secrecy. Digital signatures can usually be used as providing explicit authentication for a key agreement protocol. Shim proposed an efficient identity-based signature scheme using bilinear pairings; however, he did not give a formal security proof for it. In this paper, we present a formal security proof for Shim's signature scheme. Using Shim's signature scheme as building blocks, we propose a new two-party identity-based key agreement protocol with explicit authentication. The proposed protocol satisfies a set of desirable security properties. Compared with the related protocols, the proposed protocol has distinct advantages in terms of security and computational efficiency.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] Security of two-party identity-based key agreement
    Boyd, C
    Choo, KKR
    PROGRESS IN CRYPTOLOGY - MYCRYPT 2005, 2005, 3715 : 229 - 243
  • [2] Identity-based authenticated key agreement protocol for two-party in the standard model
    Ren, Yong-Jun
    Wang, Jian-Dong
    Zhuang, Yi
    Wang, Jian
    Xu, Da-Zhuan
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2010, 30 (02): : 174 - 178
  • [3] A new two-party identity-based authenticated key agreement
    McCullagh, N
    Barreto, PSLM
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 262 - 274
  • [4] An improved two-party identity-based authenticated key agreement protocol using pairings
    Hoelbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (01) : 142 - 150
  • [5] An efficient two-party identity-based key exchange protocol
    Tseng, Yuh-Min
    INFORMATICA, 2007, 18 (01) : 125 - 136
  • [6] Lightweight Two-Party Authentication Key Agreement Protocol
    Song, Qing
    Ma, Mimi
    Deng, Miaolei
    Zuo, Zhibin
    Computer Engineering and Applications, 2024, 60 (14) : 283 - 293
  • [7] Two improved two-party identity-based authenticated key agreement protocols
    Holbl, Marko
    Welzer, Tatjana
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1056 - 1060
  • [8] Two-party Mutual Authentication Quantum Key Agreement Protocol
    He, Ye-Feng
    Yue, Yu-Ru
    Di, Man
    Ma, Wen-Ping
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (05)
  • [9] Two-party Mutual Authentication Quantum Key Agreement Protocol
    Ye-Feng He
    Yu-Ru Yue
    Man Di
    Wen-Ping Ma
    International Journal of Theoretical Physics, 61
  • [10] An efficient protocol for two-party explicit authenticated key agreement
    Zheng, Minghui
    Zhou, Huihua
    Chen, Jing
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2954 - 2963