ID-based authenticated multiple-key agreement protocol from pairings

被引:0
|
作者
Kim, KW [1 ]
Ryu, EK [1 ]
Yoo, KY [1 ]
机构
[1] Kyungpook Natl Univ, Dept Comp Sci, Taegu 702701, South Korea
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To achieve secure data communications, participants should be authenticated and a new session key must be agreed securely. An authenticated key agreement protocol combining the meaning of user authentication and key agreement is necessary for these purposes. This paper proposes a new ID-based multiple-key agreement protocol. The authenticity of the protocol is provided by a signature scheme. The proposed protocol allows two parties to establish n(2) common secret keys if they compute and send n Diffie-Helman's public keys. The security attributes of the proposed protocol are examined using heuristic methods.
引用
收藏
页码:672 / 680
页数:9
相关论文
共 50 条
  • [21] An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks
    Li-Ping Z.
    Yi W.
    Journal of Communications, 2010, 5 (08): : 620 - 626
  • [22] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [23] Efficient ID-based authenticated key agreement protocol based on Weil pairing
    Shim, K
    ELECTRONICS LETTERS, 2003, 39 (08) : 653 - 654
  • [24] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [25] Efficient ID-Based One Round Authenticated Group Key Agreement Protocol
    Shi, Yijuan
    Chen, Gongliang
    Li, Jianhua
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 167 - 170
  • [26] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [27] An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
    陆荣幸
    曹珍富
    苏仁旺
    柴震川
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 205 - 209
  • [28] ID-Based Authenticated Dynamic Group Key Agreement
    王莺洁
    潘军
    诸鸿文
    JournalofShanghaiJiaotongUniversity, 2005, (03) : 236 - 241
  • [29] Cryptanalysis of a new efficient authenticated multiple-key exchange protocol from bilinear pairings
    Cheng, Qingfeng
    International Journal of Network Security, 2014, 16 (06) : 494 - 497
  • [30] Further analysis of ID-based authenticated group key agreement protocol from bilinear maps
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 295 - 298