A Two-Party Identity-Based Key Agreement Protocol with Explicit Authentication

被引:0
|
作者
Yang, Haomin [1 ]
Zhang, Yaoxue [1 ]
Zhou, Yuezhi [1 ]
机构
[1] Tsinghua Univ, Dept Comp Sci & Technol, Beijing 100084, Peoples R China
关键词
key agreement; identity-based cryptography; explicit authenticaito; data signature; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A two-message two-party key agreement protocol with explicit authentication provides perfect forward secrecy. Digital signatures can usually be used as providing explicit authentication for a key agreement protocol. Shim proposed an efficient identity-based signature scheme using bilinear pairings; however, he did not give a formal security proof for it. In this paper, we present a formal security proof for Shim's signature scheme. Using Shim's signature scheme as building blocks, we propose a new two-party identity-based key agreement protocol with explicit authentication. The proposed protocol satisfies a set of desirable security properties. Compared with the related protocols, the proposed protocol has distinct advantages in terms of security and computational efficiency.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 308 - 311
  • [42] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [43] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [44] Identity (ID)-based authentication and the key agreement protocol
    School of Electronics and Information Engineering, Beijing Jiaotong Univ., Beijing 100044, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2008, 3 (559-562):
  • [45] Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling
    Chaonan Wang
    Qian Zhang
    Shufan Liang
    Hongfeng Zhu
    Quantum Information Processing, 23
  • [46] Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling
    Wang, Chaonan
    Zhang, Qian
    Liang, Shufan
    Zhu, Hongfeng
    QUANTUM INFORMATION PROCESSING, 2024, 23 (04)
  • [47] Two-Party Attribute-Based Key Agreement Protocol with Constant-Size Ciphertext and Key
    Li, Jiguo
    Hu, Shengzhou
    Zhang, Yichen
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [48] New identity-based three-party authenticated key agreement protocol with provable security
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 927 - 932
  • [49] Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security
    Gupta, Daya Sagar
    Ray, Sangram
    Singh, Tajinder
    Kumari, Madhu
    COMPUTER COMMUNICATIONS, 2022, 181 : 69 - 79
  • [50] A Secure Two-Party Key Agreement Protocol with Key Escrow and Perfect Forward Secrecy
    Hou, Mengbo
    Xu, Qiuliang
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION IN COMMUNICATION, 2009, : 501 - 504