Secure Identity-Based Key Establishment Protocol

被引:0
|
作者
Pal, Om [1 ]
Saxena, Anupam [1 ]
Saquib, Zia [1 ]
Menezes, Bernard L. [2 ]
机构
[1] Ctr Dev Adv Comp, Bombay, Maharashtra, India
[2] Indian Inst Technol, Bombay, Maharashtra, India
关键词
Key Distribution; Key Management; Session Key; Deffie-Hellman; Man-in-Middle; Key Exchange;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Diffie-Hellman key exchange protocol is a well known protocol for establishing the key on the open channel but due to man-in-middle attack confidentiality of the message might be compromised. Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services. To address above issues like trustiness in PKI and man-in-middle attack in Diffie-Hellman, we propose a secure identity-based key management scheme which combines the principles of Diffie-Hellman, third party and uses the identity of the receiver to establish the common key between two nodes.
引用
收藏
页码:618 / +
页数:3
相关论文
共 50 条
  • [21] Secure Symmetric Key Fuzzy Identity-Based Encryption
    Liu, Pengtao
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2665 - 2668
  • [22] A Secure Identity-based Deniable Authentication Protocol for MANETs
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
  • [23] Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network
    Lian, Huanhuan
    Kang, Burong
    Yang, Libao
    IEEE ACCESS, 2024, 12 : 98611 - 98622
  • [24] Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC
    Farash, Mohammad Dabzinejad
    Attari, Mahmoud Ahmadian
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (01): : 55 - 70
  • [25] A secure and efficient identity-based authenticated key exchange protocol for mobile client–server networks
    Mohammad Sabzinejad Farash
    Mahmoud Ahmadian Attari
    The Journal of Supercomputing, 2014, 69 : 395 - 411
  • [26] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Libing Wu
    Yubo Zhang
    Yong Xie
    Abdulhameed Alelaiw
    Jian Shen
    Wireless Personal Communications, 2017, 94 : 3371 - 3387
  • [27] Secure and Authenticated Key Agreement Protocol with Minimal Complexity of Operations in the Context of Identity-Based Cryptosystems
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    2015 2ND INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATIONS, AND CONTROL TECHNOLOGY (I4CT), 2015,
  • [28] An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
    Wu, Libing
    Zhang, Yubo
    Xie, Yong
    Alelaiw, Abdulhameed
    Shen, Jian
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 3371 - 3387
  • [29] On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access
    Jiang, J
    He, C
    Jiang, LG
    NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 972 - 981
  • [30] A resilient identity-based authenticated key exchange protocol
    Elashry, Ibrahim
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2279 - 2290