Identity based authenticated key agreement protocols from pairings

被引:139
|
作者
Chen, LQ [1 ]
Kudla, C [1 ]
机构
[1] Hewlett Packard Labs, Bristol BS34 8QZ, Avon, England
关键词
D O I
10.1109/CSFW.2003.1212715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate a number of issues related to identity based authenticated key agreement protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues include how to make protocols efficient; to avoid key escrow by a Trust Authoritiy (TA) who issues identity based private keys for users, and to allow users to use different TAs. We describe a few authenticated key agreement (AK) protocols and AK with key confirmation (AKC) protocols by modifying Smart's AK protocol [26]. We discuss the security of these protocols heuristically and give formal proofs of security for our AK and AKC protocols (using a security model based on the model defined in [3]). We also prove that our AK protocol has the key compromise impersonation property. We also show that our second protocol has the TA forward secrecy property (which we define to mean that the compromise of the TA's private key will not compromise previously established session keys), and we note that this also implies that it has the perfect forward secrecy property.
引用
收藏
页码:219 / 233
页数:15
相关论文
共 50 条
  • [1] Cryptanalysis on identity-based authenticated key agreement protocols from pairings
    Hou M.
    Xu Q.
    Shanqing G.
    Jiang H.
    Journal of Networks, 2010, 5 (07) : 855 - 862
  • [2] IDENTITY BASED AUTHENTICATED KEY AGREEMENT FROM PAIRINGS
    Lee, Hyang-Sook
    Lee, Young-Ran
    COMMUNICATIONS OF THE KOREAN MATHEMATICAL SOCIETY, 2005, 20 (04): : 849 - 859
  • [3] Tripartite authenticated key agreement protocols from pairings
    Al-Riyami, SS
    Paterson, KG
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359
  • [4] Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
    Guo, Hua
    Mu, Yi
    Zhang, Xiyong
    Li, Zhoujun
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 310 - +
  • [5] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [6] Identity-based key agreement protocols from pairings
    L. Chen
    Z. Cheng
    N. P. Smart
    International Journal of Information Security, 2007, 6 : 213 - 241
  • [7] Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    INFORMATION SCIENCES, 2016, 367 : 176 - 193
  • [8] New Secure Identity-Based and Certificateless Authenticated Key Agreement Protocols Without Pairings
    Ghoreishi, Seyed-Mohsen
    Razak, Shukor Abd
    Isnin, Ismail Fauzi
    Chizari, Hassan
    2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 188 - 192
  • [9] Two proposed identity-based three-party authenticated key agreement protocols from pairings
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    COMPUTERS & SECURITY, 2010, 29 (02) : 244 - 252
  • [10] Efficient identity-based authenticated key agreement protocol from pairings
    Choie, YJ
    Jeong, E
    Lee, E
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 179 - 188