Secure Identity-Based Key Establishment Protocol

被引:0
|
作者
Pal, Om [1 ]
Saxena, Anupam [1 ]
Saquib, Zia [1 ]
Menezes, Bernard L. [2 ]
机构
[1] Ctr Dev Adv Comp, Bombay, Maharashtra, India
[2] Indian Inst Technol, Bombay, Maharashtra, India
关键词
Key Distribution; Key Management; Session Key; Deffie-Hellman; Man-in-Middle; Key Exchange;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Diffie-Hellman key exchange protocol is a well known protocol for establishing the key on the open channel but due to man-in-middle attack confidentiality of the message might be compromised. Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services. To address above issues like trustiness in PKI and man-in-middle attack in Diffie-Hellman, we propose a secure identity-based key management scheme which combines the principles of Diffie-Hellman, third party and uses the identity of the receiver to establish the common key between two nodes.
引用
收藏
页码:618 / +
页数:3
相关论文
共 50 条
  • [1] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    中国通信, 2007, 4 (04) : 11 - 22
  • [2] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [3] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [4] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [5] A strongly secure identity-based authenticated group key exchange protocol
    TENG JiKai
    WU ChuanKun
    TANG ChunMing
    TIAN YouLiang
    ScienceChina(InformationSciences), 2015, 58 (09) : 98 - 109
  • [6] A strongly secure identity-based authenticated group key exchange protocol
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    Tian YouLiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (09) : 1 - 12
  • [7] Identity-Based Key Management Scheme for Secure Discussion Group Establishment in DOSNs
    Zhang, Lei
    Han, Wendie
    Zhang, Rui
    Wang, Lulu
    Meng, Xinyu
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3706 - 3719
  • [8] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [9] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [10] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    Chinese Journal of Electronics, 2015, 24 (02) : 332 - 337