Identity-based One Round Key Agreement Protocol without Bilinear Pairings

被引:2
|
作者
Liu, Wenhao [1 ]
Wang, Shengbao [1 ]
Tan, Xiao [1 ]
Xie, Qi [1 ]
Wang, Qizhen [2 ]
机构
[1] Hangzhou Normal Univ, Sch Informat Sci & Engn, Hangzhou, Zhejiang, Peoples R China
[2] PLA, Unit 61135, Beijing, Peoples R China
关键词
Identity-based; bilinear pairings; mBR model; computational Diffie-Hellman problem;
D O I
10.1109/3PGCIC.2015.70
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Almost all the existing identity-based key agreement (ID-KA) protocols cannot achieve both ephemeral secret reveal resilience and pairing-free. In this paper, a pairing-free ID-KA protocol is proposed, which captures all basic desirable security properties including key generation center forward secrecy, key compromise impersonation resilience and ephemeral secrets reveal resistance. On the other hand, the proposed scheme only needs one round communication between the two parties. Compared with the previous ID-KA protocols, the proposed scheme is more secure and efficient.
引用
收藏
页码:470 / 473
页数:4
相关论文
共 50 条
  • [41] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Domingo-Ferrer, Josep
    COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
  • [42] An efficient identity-based tripartite authenticated key agreement protocol
    Zuowen Tan
    Electronic Commerce Research, 2012, 12 : 505 - 518
  • [43] An identity-based group key agreement protocol from pairing
    Wang, Hongji
    Yao, Gang
    Jiang, Qingshan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 532 - +
  • [44] An efficient identity-based tripartite authenticated key agreement protocol
    Tan, Zuowen
    ELECTRONIC COMMERCE RESEARCH, 2012, 12 (04) : 505 - 518
  • [45] Identity-based Remote Authentication and Key Agreement Protocol with Anonymity
    Zhang Jianjun
    Wu Qiwu
    PROCEEDINGS OF THE 1ST INTERNATIONAL WORKSHOP ON CLOUD COMPUTING AND INFORMATION SECURITY (CCIS 2013), 2013, 52 : 14 - 17
  • [46] Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings
    Guo, Hua
    Mu, Yi
    Zhang, Xiyong
    Li, Zhoujun
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2009, 5585 : 310 - +
  • [47] Identity-based authenticated key agreement protocol based on Weil pairing
    Smart, NP
    ELECTRONICS LETTERS, 2002, 38 (13) : 630 - 632
  • [48] An identity-based ring signature scheme from bilinear pairings
    Lin, CY
    Wu, TC
    18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, 2004, : 182 - 185
  • [49] Identity-Based Threshold Proxy Signature from Bilinear Pairings
    Liu, Jenshiuh
    Huang, Shaonong
    INFORMATICA, 2010, 21 (01) : 41 - 56
  • [50] Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
    Shim, K
    Woo, S
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (03) : 523 - 530