Strongly secure identity-based authenticated key agreement protocols

被引:39
|
作者
Ni, Liang [1 ]
Chen, Gongliang [1 ]
Li, Jianhua [1 ]
Hao, Yanyan [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[2] Zhongzhou Univ, Expt Management Ctr, Zhengzhou 450044, Peoples R China
基金
中国国家自然科学基金;
关键词
EXCHANGE;
D O I
10.1016/j.compeleceng.2011.03.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a strongly secure identity-based (ID-based) two-party authenticated key agreement (AKA) protocol, which captures all basic desirable security properties including master key forward secrecy, ephemeral secrets reveal resistance and so on, and is provably secure in the extended Canetti-Krawczyk (eCK) model. The security of the protocol can be reduced to the standard Computational Bilinear Diffie-Hellman assumption in the random oracle model. Our scheme is secure as long as each party has at least one uncompromised secret. Also, we give a strongly secure variant of the protocol. The variant has a much lower computational overhead than the original scheme, while its security relies on the Gap Bilinear Diffie-Hellman assumption. Currently, there are few ID-based AKA protocols that are provably secure in the strong eCK model. Compared with previous ID-based AKA schemes, our protocols have advantages over them in security or efficiency. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:205 / 217
页数:13
相关论文
共 50 条
  • [1] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    NI Liang
    CHEN GongLiang
    LI JianHua
    HAO YanYan
    ScienceChina(InformationSciences), 2013, 56 (08) : 189 - 202
  • [2] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Liang Ni
    GongLiang Chen
    JianHua Li
    YanYan Hao
    Science China Information Sciences, 2013, 56 : 1 - 14
  • [3] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Ni Liang
    Chen GongLiang
    Li JianHua
    Hao YanYan
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (08) : 1 - 14
  • [4] Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    INFORMATION SCIENCES, 2016, 367 : 176 - 193
  • [5] Strongly Secure Identity-based Authenticated Key Agreement for Wireless Sensor Network
    Shui, Guohong
    Chen, Ming
    DISASTER ADVANCES, 2012, 5 : 187 - 195
  • [6] Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    INFORMATION SCIENCES, 2011, 181 (03) : 628 - 647
  • [7] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia S.
    Quan J.-X.
    Han W.-B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [8] New Secure Identity-Based and Certificateless Authenticated Key Agreement Protocols Without Pairings
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 188 - 192
  • [9] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [10] Identity-based authenticated key agreement protocols in the standard model
    Ren, Yongjun
    Wang, Jiandong
    Wang, Jian
    Xu, Dazhuan
    Zhuang, Yi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1604 - 1610