Identity-based One Round Key Agreement Protocol without Bilinear Pairings

被引:2
|
作者
Liu, Wenhao [1 ]
Wang, Shengbao [1 ]
Tan, Xiao [1 ]
Xie, Qi [1 ]
Wang, Qizhen [2 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou, Zhejiang, Peoples R China
[2] PLA, Unit 61135, Beijing, Peoples R China
关键词
Identity-based; bilinear pairings; mBR model; computational Diffie-Hellman problem;
D O I
10.1109/3PGCIC.2015.70
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all the existing identity-based key agreement (ID-KA) protocols cannot achieve both ephemeral secret reveal resilience and pairing-free. In this paper, a pairing-free ID-KA protocol is proposed, which captures all basic desirable security properties including key generation center forward secrecy, key compromise impersonation resilience and ephemeral secrets reveal resistance. On the other hand, the proposed scheme only needs one round communication between the two parties. Compared with the previous ID-KA protocols, the proposed scheme is more secure and efficient.
引用
收藏
页码:470 / 473
页数:4
相关论文
共 50 条
  • [31] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [32] A flexible ID-based group key agreement protocol with bilinear pairings
    Liang, Jun
    Yoo, Hyeong Seon
    RECENT PROGRESS IN COMPUTATIONAL SCIENCES AND ENGINEERING, VOLS 7A AND 7B, 2006, 7A-B : 325 - 328
  • [33] Tripartite Outsoursing Key-Agreement Protocol on Bilinear Pairings
    Aleksandrova, E. B.
    Shkorkina, E. N.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (08) : 796 - 801
  • [34] An efficient group key agreement protocol from bilinear pairings
    Hu, Chengyu
    Liu, Pengtao
    Li, Daxing
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 737 - +
  • [35] An Identity-Based Proxy Signature from Bilinear Pairings
    Ji, Huifang
    Han, Wenbao
    Zhao, Long
    Wang, Yongjuan
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 14 - 17
  • [36] Identify-Based Authenticated Key Agreement Protocols without Bilinear Pairings
    Cao, Xuefei
    Kou, Weidong
    Yu, Yong
    Sun, Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) : 3833 - 3836
  • [37] Identity-based key agreement protocol for mobile ad-hoc networks using bilinear pairing
    Chien, Hung-Yu
    Lin, Ru-Yu
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 520 - +
  • [38] A One-Pass Identity-Based Authentication and Key Agreement Protocol for Wireless Roaming
    Bao, Qingrui
    Hou, Mengbo
    Choo, Kim-Kwang Raymond
    2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 443 - 447
  • [39] An identity-based strongly unforgeable signature without random oracles from bilinear pairings
    Kwon, Saeran
    INFORMATION SCIENCES, 2014, 276 : 1 - 9
  • [40] A Provably Secure Scalable Revocable Identity-Based Signature Scheme Without Bilinear Pairings
    Wang, Changji
    Huang, Hui
    Yuan, Yuan
    SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 588 - 597