Secure Identity-Based Key Establishment Protocol

被引:0
|
作者
Pal, Om [1 ]
Saxena, Anupam [1 ]
Saquib, Zia [1 ]
Menezes, Bernard L. [2 ]
机构
[1] Ctr Dev Adv Comp, Bombay, Maharashtra, India
[2] Indian Inst Technol, Bombay, Maharashtra, India
关键词
Key Distribution; Key Management; Session Key; Deffie-Hellman; Man-in-Middle; Key Exchange;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Diffie-Hellman key exchange protocol is a well known protocol for establishing the key on the open channel but due to man-in-middle attack confidentiality of the message might be compromised. Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services. To address above issues like trustiness in PKI and man-in-middle attack in Diffie-Hellman, we propose a secure identity-based key management scheme which combines the principles of Diffie-Hellman, third party and uses the identity of the receiver to establish the common key between two nodes.
引用
收藏
页码:618 / +
页数:3
相关论文
共 50 条
  • [41] A secure and efficient identity-based authenticated key exchange protocol for mobile client-server networks
    Farash, Mohammad Sabzinejad
    Attari, Mahmoud Ahmadian
    JOURNAL OF SUPERCOMPUTING, 2014, 69 (01): : 395 - 411
  • [42] Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2011, 181 (19) : 4318 - 4329
  • [43] A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3167 - 3179
  • [44] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [45] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [46] Improvement of Gunther's identity-based key exchange protocol
    Saeednia, S
    ELECTRONICS LETTERS, 2000, 36 (18) : 1535 - 1536
  • [47] Identity-based conference key distribution protocol with user anonymity
    Cai Yongquan
    Wang Yali
    CHINESE JOURNAL OF ELECTRONICS, 2007, 16 (01): : 179 - 181
  • [48] Efficient identity-based authenticated multiple key exchange protocol
    Chen, Yitao
    Han, Weiwei
    ACTA SCIENTIARUM-TECHNOLOGY, 2013, 35 (04) : 629 - 636
  • [49] Identity-Based Authenticate Key Exchange Protocol from Lattice
    Wang, Hao
    Zhao, Chuan
    Xu, Qiuliang
    Wang, Yilei
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 564 - 568
  • [50] Efficient identity-based authenticated multiple key exchange protocol
    Tan, Zuowen
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 191 - 198