Identity-based One Round Key Agreement Protocol without Bilinear Pairings

被引:2
|
作者
Liu, Wenhao [1 ]
Wang, Shengbao [1 ]
Tan, Xiao [1 ]
Xie, Qi [1 ]
Wang, Qizhen [2 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou, Zhejiang, Peoples R China
[2] PLA, Unit 61135, Beijing, Peoples R China
关键词
Identity-based; bilinear pairings; mBR model; computational Diffie-Hellman problem;
D O I
10.1109/3PGCIC.2015.70
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all the existing identity-based key agreement (ID-KA) protocols cannot achieve both ephemeral secret reveal resilience and pairing-free. In this paper, a pairing-free ID-KA protocol is proposed, which captures all basic desirable security properties including key generation center forward secrecy, key compromise impersonation resilience and ephemeral secrets reveal resistance. On the other hand, the proposed scheme only needs one round communication between the two parties. Compared with the previous ID-KA protocols, the proposed scheme is more secure and efficient.
引用
收藏
页码:470 / 473
页数:4
相关论文
共 50 条
  • [21] An efficient identity-based blind signature scheme without bilinear pairings
    He, Debiao
    Chen, Jianhua
    Zhang, Rui
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (04) : 444 - 450
  • [22] An improved two-party identity-based authenticated key agreement protocol using pairings
    Hoelbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (01) : 142 - 150
  • [23] An Efficient Fuzzy Identity-based Signature Scheme without Bilinear Pairings
    Wang, Changji
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 440 - 444
  • [24] Certificateless Proxy Identity-Based Signcryption Scheme Without Bilinear Pairings
    Qi Yanfeng
    Tang Chunming
    Lou Yu
    Xu Maozhi
    Guo Baoan
    CHINA COMMUNICATIONS, 2013, 10 (11) : 37 - 41
  • [25] Cryptanalysis on identity-based authenticated key agreement protocols from pairings
    Hou M.
    Xu Q.
    Shanqing G.
    Jiang H.
    Journal of Networks, 2010, 5 (07) : 855 - 862
  • [26] Identity-based key agreement for peer group communication from pairings
    Wu, ST
    Chiu, JH
    Chieu, BC
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (10) : 2762 - 2768
  • [27] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    ZHU Yan
    WANG Shanbiao
    MA Di
    FENG Rongquan
    Chinese Journal of Electronics, 2014, 23 (04) : 842 - 850
  • [28] Identity-Based Encryption on RSA Without Pairings and Key Escrow
    Zhu Yan
    Wang Shanbiao
    Ma Di
    Feng Rongquan
    CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 842 - 850
  • [29] An Identity-Based Key Agreement Protocol for the Network Layer
    Schridde, Christian
    Smith, Matthew
    Freisleben, Bernd
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 409 - 422
  • [30] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825