Making the Diffie-Hellman Protocol Identity-Based

被引:0
|
作者
Fiore, Dario [1 ]
Gennaro, Rosario [2 ]
机构
[1] Univ Catania, Dipartimento Matemat & Informat, I-95124 Catania, Italy
[2] IBM T J Watson Res Ctr, Hawthorne, NY 10532 USA
关键词
KEY-EXCHANGE; IDENTIFICATION; SIGNATURES; SECURITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [29]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known. The novelty of our protocol is that it call be implemented over any cyclic group of prime order, where the Diffie-Hellman problem is supposed to be hard. It does not require the computation of expensive bilinear maps, or additional assumptions such as factoring or RSA. The protocol is extremely efficient, requiring only twice the amount of bandwith and computation of the unauthenticated basic Diffie-Hellman protocol. The design of our protocol was inspired by MQV (the most, efficient authenticated Diffie-Hellman based protocol in the public-key model) and indeed its performance is competitive with respect to MQV (especially when one includes the transmission and verification of certificates in the MQV protocol, which are not, required in an id-based scheme). Our protocol requires a single round of communication in which each party sends only 2 group elements: a very short message, especially when the protocol is implemented over elliptic curves. We provide a. full proof of security in the Canetti-Krawczyk security model for key exchange, including a proof that our protocol satisfies additional security properties such as forward secrecy, and resistance to reflection and key-compromise impersonation attacks.
引用
收藏
页码:165 / +
页数:3
相关论文
共 50 条
  • [1] Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable
    Nakagawa, Kohei
    Fujioka, Atsushi
    Nagai, Akira
    Tomida, Junichi
    Xagawa, Keita
    Yasuda, Kan
    [J]. PROGRESS IN CRYPTOLOGY, LATINCRYPT 2023, 2023, 14168 : 171 - 191
  • [2] Identity-based Encryption from the Diffie-Hellman Assumption
    Doettling, Nico
    Garg, Sanjam
    [J]. JOURNAL OF THE ACM, 2021, 68 (03)
  • [3] Identity-Based Encryption from the Diffie-Hellman Assumption
    Dottling, Nico
    Garg, Sanjam
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 537 - 569
  • [4] An identity-based signature from gap Diffie-Hellman groups
    Cha, JC
    Cheon, JH
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2003, PROCEEDINGS, 2003, 2567 : 18 - 30
  • [5] The Diffie-Hellman protocol
    Maurer, UM
    Wolf, S
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) : 147 - 171
  • [6] mOT plus : An Efficient and Secure Identity-Based Diffie-Hellman Protocol over RSA Group
    Tian, Baoping
    Wei, Fushan
    Ma, Chuangui
    [J]. TRUSTED SYSTEMS, INTRUST 2014, 2015, 9473 : 407 - 421
  • [7] Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem
    Hu, Ziyuan
    Liu, Shengli
    Chen, Kefei
    Liu, Joseph K.
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 265 - 283
  • [8] An Alternative Diffie-Hellman Protocol
    Jarpe, Eric
    [J]. CRYPTOGRAPHY, 2020, 4 (01) : 1 - 10
  • [9] A Quantum Diffie-Hellman Protocol
    Subramaniam, Pranav
    Parakh, Abhishek
    [J]. 2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 523 - 524
  • [10] Diffie-Hellman Protocol as a Symmetric Cryptosystem
    Burda, Karel
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (07): : 33 - 37