Identity-based key agreement protocols in a multiple PKG environment

被引:0
|
作者
Lee, H [1 ]
Kim, D [1 ]
Kim, S [1 ]
Oh, H [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
ID-based cryptosystem; bilinear map; key agreement protocol; multiple PKG;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
To date, most identity-based key agreement protocols are based on a single PKG (Private Key Generator) environment. In 2002, Chen and Kudla proposed an identity-based key agreement protocol for a multiple PKG environment, where each PKG shares identical system parameters but possesses a distinct master key. However, it is more realistic to assume that each PKG uses different system parameters. In this paper, we propose a new two party key agreement protocol between users belonging to different PKGs that do not share system parameters. We also extend this protocol to a tripartite key agreement protocol. Our two party protocol requires the same amount of pairing computation as Smart's protocol for a single PKG environment and provides PKG forward secrecy. We show that the proposed key agreement protocols satisfy every security requirements of key agreement protocols.
引用
收藏
页码:877 / 886
页数:10
相关论文
共 50 条
  • [1] An attack on the identity-based key agreement protocols in multiple PKG environment
    Oh, J
    Moon, S
    Ma, JF
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (03) : 826 - 829
  • [2] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia S.
    Quan J.-X.
    Han W.-B.
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [3] An Efficient Identity-Based Key Agreement Protocol in a Multiple PKG Environment
    ZHOU Huan
    WANG Xiaofeng
    SU Jinshu
    [J]. Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 455 - 460
  • [4] Identity Based Group Key Agreement in Multiple PKG Environment
    WANG Liming~ 1
    2. Graduate University of Chinese Academy of Sciences
    [J]. Wuhan University Journal of Natural Sciences, 2006, (06) : 1605 - 1608
  • [5] Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security
    Tan, Zuowen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (08): : 1982 - 1997
  • [6] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [7] Identity-based key agreement protocols from pairings
    L. Chen
    Z. Cheng
    N. P. Smart
    [J]. International Journal of Information Security, 2007, 6 : 213 - 241
  • [8] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    [J]. IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [9] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [10] Identity-based authenticated key agreement protocols in the standard model
    Ren, Yongjun
    Wang, Jiandong
    Wang, Jian
    Xu, Dazhuan
    Zhuang, Yi
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1604 - 1610