Secure Identity-Based Key Establishment Protocol

被引:0
|
作者
Pal, Om [1 ]
Saxena, Anupam [1 ]
Saquib, Zia [1 ]
Menezes, Bernard L. [2 ]
机构
[1] Ctr Dev Adv Comp, Bombay, Maharashtra, India
[2] Indian Inst Technol, Bombay, Maharashtra, India
关键词
Key Distribution; Key Management; Session Key; Deffie-Hellman; Man-in-Middle; Key Exchange;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Diffie-Hellman key exchange protocol is a well known protocol for establishing the key on the open channel but due to man-in-middle attack confidentiality of the message might be compromised. Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services. To address above issues like trustiness in PKI and man-in-middle attack in Diffie-Hellman, we propose a secure identity-based key management scheme which combines the principles of Diffie-Hellman, third party and uses the identity of the receiver to establish the common key between two nodes.
引用
收藏
页码:618 / +
页数:3
相关论文
共 50 条
  • [31] An Identity-Based Key Agreement Protocol for the Network Layer
    Schridde, Christian
    Smith, Matthew
    Freisleben, Bernd
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 409 - 422
  • [32] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
  • [33] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [34] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)
  • [35] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [36] Forward Secure Identity-based Key Agreement for Dynamic Groups
    Mailloux, Nick
    Miri, Ali
    Nevins, Monica
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 102 - 111
  • [37] Secure identity-based encryption: overcoming the key escrow challenge
    Afroaz, Khaleda
    Rao, Y.V. Subba
    Rekha, N. Rukma
    International Journal of Security and Networks, 2024, 19 (02) : 55 - 62
  • [38] An Identity-Based Secure Multicast Protocol in IPv6
    Dou, Ruiyu
    Lan, Julong
    Chen, Yue
    Liu, Yang
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [39] Identity-based secure inter-domain routing protocol
    Wang, Na
    Zhi, Ying-Jian
    Zhang, Jian-Hui
    Cheng, Dong-Nian
    Wang, Bin-Qiang
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (12): : 3223 - 3239
  • [40] Identity-based key-insulated signature with secure key-updates
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    Li, Xiangxue
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 13 - +