Strongly secure identity-based authenticated key agreement protocols without bilinear pairings

被引:22
|
作者
Ni, Liang [1 ,2 ]
Chen, Gongliang [2 ]
Li, Jianhua [2 ]
Hao, Yanyan [3 ]
机构
[1] Zhongyuan Univ Technol, Sch Comp Sci, 41 Zhongyuan Rd M, Zhengzhou 450007, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, 800 Dongchuan Rd, Shanghai 200240, Peoples R China
[3] Zhongzhou Univ, Expt Management Ctr, Zhengzhou 450044, Peoples R China
基金
中国国家自然科学基金;
关键词
Authenticated key agreement; Identity-based cryptography; Provable security; Diffie-Hellman assumption; The extended Canetti-Krawczyk model; EFFICIENT; EXCHANGE; SIGNATURES;
D O I
10.1016/j.ins.2016.05.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present two strongly secure pairing-free identity-based (ID-based) twoparty authenticated key agreement (AKA) protocols achieving implicit authentication, which are proven secure in the extended Canetti-Krawczyk (eCK) model. The proposals can offer provable security against both passive and active adversaries in the random oracle model. Our schemes capture all basic desirable security properties including key compromise impersonation resilience, ephemeral secrets reveal resistance, (weak) perfect forward secrecy and master key forward secrecy etc. We show the security of one of these proposals can be reduced to the standard computational Diffie-Hellman assumption, and the security of the other relies on the gap Diffie-Hellman assumption while having a lower computational overhead. Currently, there are few pairing-free ID-based AKA protocols that are provably secure in such strong security models as the eCK model. Our schemes can provide strong security assurances and in the meanwhile achieve a good computational efficiency. Compared with previous related schemes, our protocols have advantages over them in security, efficiency or both. (C) 2016 Elsevier Inc. All rights reserved.
引用
收藏
页码:176 / 193
页数:18
相关论文
共 50 条
  • [1] New Secure Identity-Based and Certificateless Authenticated Key Agreement Protocols Without Pairings
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 188 - 192
  • [2] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [3] A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3167 - 3179
  • [4] A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    [J]. PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 287 - 294
  • [5] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    NI Liang
    CHEN GongLiang
    LI JianHua
    HAO YanYan
    [J]. Science China(Information Sciences), 2013, 56 (08) : 189 - 202
  • [6] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Liang Ni
    GongLiang Chen
    JianHua Li
    YanYan Hao
    [J]. Science China Information Sciences, 2013, 56 : 1 - 14
  • [7] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Ni Liang
    Chen GongLiang
    Li JianHua
    Hao YanYan
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (08) : 1 - 14
  • [8] Cryptanalysis on identity-based authenticated key agreement protocols from pairings
    Hou, Mengbo
    Xu, Qiuliang
    Shanqing, Guo
    Jiang, Han
    [J]. Journal of Networks, 2010, 5 (07) : 855 - 862
  • [9] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    [J]. INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [10] Identify-Based Authenticated Key Agreement Protocols without Bilinear Pairings
    Cao, Xuefei
    Kou, Weidong
    Yu, Yong
    Sun, Rong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) : 3833 - 3836