Strongly secure identity-based authenticated key agreement protocols in the escrow mode

被引:0
|
作者
Liang Ni
GongLiang Chen
JianHua Li
YanYan Hao
机构
[1] Shanghai Jiaotong University,School of Information Security Engineering
[2] Zhongzhou University,Experiment Management Center
来源
关键词
authenticated key agreement; identity-based cryptography; key escrow; provable security; bilinear Diffie-Hellman assumption;
D O I
暂无
中图分类号
学科分类号
摘要
Escrowable identity-based authenticated key agreement (AKA) protocols are desirable under certain circumstances especially in certain closed groups applications. In this paper, we focus on two-party identitybased AKA schemes in the escrow mode, and present a strongly secure escrowable identity-based AKA protocol which captures all basic desirable security properties including perfect forward secrecy, ephemeral secrets reveal resistance and so on. The protocol is provably secure in the extended Canetti-Krawczyk model, and its security can be reduced to the standard computational bilinear Diffie-Hellman assumption in the random oracle model. Assuming no adversary can obtain the master private key for the escrow mode, our scheme is secure as long as each party has at least one uncompromised secret. Also, we present two strongly secure variants of the protocol, which are computationally more efficient than the original scheme.
引用
收藏
页码:1 / 14
页数:13
相关论文
共 50 条
  • [1] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    NI Liang
    CHEN GongLiang
    LI JianHua
    HAO YanYan
    [J]. Science China(Information Sciences), 2013, 56 (08) : 189 - 202
  • [2] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Ni Liang
    Chen GongLiang
    Li JianHua
    Hao YanYan
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (08) : 1 - 14
  • [3] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [4] Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    CHOO Kim-Kwang Raymond
    [J]. Science China(Information Sciences), 2009, (08) : 1358 - 1370
  • [5] Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    Wang ShengBao
    Cao ZhenFu
    Cheng ZhaoHui
    Choo, Kim-Kwang Raymond
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (08): : 1358 - 1370
  • [6] Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    ShengBao Wang
    ZhenFu Cao
    ZhaoHui Cheng
    Kim-Kwang Raymond Choo
    [J]. Science in China Series F: Information Sciences, 2009, 52 : 1358 - 1370
  • [7] Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    [J]. INFORMATION SCIENCES, 2016, 367 : 176 - 193
  • [8] Strongly Secure Identity-based Authenticated Key Agreement for Wireless Sensor Network
    Shui, Guohong
    Chen, Ming
    [J]. DISASTER ADVANCES, 2012, 5 : 187 - 195
  • [9] Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    [J]. INFORMATION SCIENCES, 2011, 181 (03) : 628 - 647
  • [10] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia, Song
    Quan, Jian-Xiao
    Han, Wen-Bao
    [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399