Strongly secure identity-based authenticated key agreement protocols

被引:39
|
作者
Ni, Liang [1 ]
Chen, Gongliang [1 ]
Li, Jianhua [1 ]
Hao, Yanyan [2 ]
机构
[1] Shanghai Jiao Tong Univ, Sch Informat Secur Engn, Shanghai 200240, Peoples R China
[2] Zhongzhou Univ, Expt Management Ctr, Zhengzhou 450044, Peoples R China
基金
中国国家自然科学基金;
关键词
EXCHANGE;
D O I
10.1016/j.compeleceng.2011.03.001
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present a strongly secure identity-based (ID-based) two-party authenticated key agreement (AKA) protocol, which captures all basic desirable security properties including master key forward secrecy, ephemeral secrets reveal resistance and so on, and is provably secure in the extended Canetti-Krawczyk (eCK) model. The security of the protocol can be reduced to the standard Computational Bilinear Diffie-Hellman assumption in the random oracle model. Our scheme is secure as long as each party has at least one uncompromised secret. Also, we give a strongly secure variant of the protocol. The variant has a much lower computational overhead than the original scheme, while its security relies on the Gap Bilinear Diffie-Hellman assumption. Currently, there are few ID-based AKA protocols that are provably secure in the strong eCK model. Compared with previous ID-based AKA schemes, our protocols have advantages over them in security or efficiency. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:205 / 217
页数:13
相关论文
共 50 条
  • [32] Secure and Authenticated Key Agreement Protocol with Minimal Complexity of Operations in the Context of Identity-Based Cryptosystems
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [33] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [34] An efficient identity-based tripartite authenticated key agreement protocol
    Zuowen Tan
    Electronic Commerce Research, 2012, 12 : 505 - 518
  • [35] An efficient identity-based tripartite authenticated key agreement protocol
    Tan, Zuowen
    ELECTRONIC COMMERCE RESEARCH, 2012, 12 (04) : 505 - 518
  • [36] Certificateless and identity-based authenticated asymmetric group key agreement
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Deng, Hua
    Li, Jiangtao
    Liu, Jianwei
    Shi, Wenchang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (05) : 559 - 576
  • [37] Certificateless and identity-based authenticated asymmetric group key agreement
    Lei Zhang
    Qianhong Wu
    Bo Qin
    Hua Deng
    Jiangtao Li
    Jianwei Liu
    Wenchang Shi
    International Journal of Information Security, 2017, 16 : 559 - 576
  • [38] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [39] Identity-based authenticated key agreement protocol based on Weil pairing
    Smart, NP
    ELECTRONICS LETTERS, 2002, 38 (13) : 630 - 632
  • [40] Identity-based key agreement protocols from pairings
    L. Chen
    Z. Cheng
    N. P. Smart
    International Journal of Information Security, 2007, 6 : 213 - 241