A Two-Party Identity-Based Key Agreement Protocol with Explicit Authentication

被引:0
|
作者
Yang, Haomin [1 ]
Zhang, Yaoxue [1 ]
Zhou, Yuezhi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
key agreement; identity-based cryptography; explicit authenticaito; data signature; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-message two-party key agreement protocol with explicit authentication provides perfect forward secrecy. Digital signatures can usually be used as providing explicit authentication for a key agreement protocol. Shim proposed an efficient identity-based signature scheme using bilinear pairings; however, he did not give a formal security proof for it. In this paper, we present a formal security proof for Shim's signature scheme. Using Shim's signature scheme as building blocks, we propose a new two-party identity-based key agreement protocol with explicit authentication. The proposed protocol satisfies a set of desirable security properties. Compared with the related protocols, the proposed protocol has distinct advantages in terms of security and computational efficiency.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] An Identity-Based Key Agreement Protocol for the Network Layer
    Schridde, Christian
    Smith, Matthew
    Freisleben, Bernd
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 409 - 422
  • [32] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
  • [33] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [34] An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment
    Yang, Huibo
    Chen, Jianhua
    Zhang, Yuanyuan
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 1399 - 1409
  • [35] An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment
    Huibo Yang
    Jianhua Chen
    Yuanyuan Zhang
    Wireless Personal Communications, 2015, 85 : 1399 - 1409
  • [36] A fresh Two-party Authentication Key Exchange Protocol for Mobile Environment
    Yang, H. B.
    Chen, J. H.
    Zhang, Y. Y.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT SCIENCE (ITMS 2015), 2015, 34 : 933 - 936
  • [37] An efficient two-party authentication key exchange protocol for mobile environment
    Qi, Mingping
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [38] Two-party certificateless authenticated key agreement protocol with enhanced security
    Tao W.
    Xiaojun J.
    Journal of China Universities of Posts and Telecommunications, 2019, 26 (01): : 12 - 20
  • [39] A Two-Party Certificateless Authenticated Key Agreement Protocol without Pairing
    Hou, Mengbo
    Xu, Qiuliang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 412 - 416
  • [40] Two-party certificateless authenticated key agreement protocol with enhanced security
    Wu Tao
    Jing Xiaojun
    The Journal of China Universities of Posts and Telecommunications, 2019, 26 (01) : 12 - 20