Authenticating tripartite key agreement protocol with pairings

被引:0
|
作者
Sheng-Li Liu
Fang-Guo Zhang
Ke-Fei Chen
机构
[1] Shanghai Jiao Tong University,Department of Computer Science and Engineering
[2] Zhongshan University,School of Information Science and Technology
关键词
key agreement; bilinear pairing; identity-based cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.
引用
收藏
页码:169 / 176
页数:7
相关论文
共 50 条
  • [41] Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys
    Wang, LH
    Okamoto, T
    Takagi, T
    Okamoto, E
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 198 - 203
  • [42] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [43] An ID-based non-interactive tripartite key agreement protocol with K-resilience
    Tso, R
    Okamoto, T
    Takagi, T
    Okamoto, E
    PROCEEDINGS OF THE THIRD IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND COMPUTER NETWORKS, 2005, : 38 - 42
  • [44] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [45] Cryptanalysis of improved one-round Lin-Li's tripartite key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 1916 - +
  • [46] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [47] An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings
    He, Debiao
    AD HOC NETWORKS, 2012, 10 (06) : 1009 - 1016
  • [48] ID-Based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices
    Tsai, Jia-Lun
    Lo, Nai-Wei
    Wu, Tzong-Chen
    AD HOC & SENSOR WIRELESS NETWORKS, 2013, 17 (3-4) : 221 - 231
  • [49] A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3167 - 3179
  • [50] Efficient password authenticated key agreement using bilinear pairings
    Juang, Wen-Shenq
    Nien, Wei-Ken
    MATHEMATICAL AND COMPUTER MODELLING, 2008, 47 (11-12) : 1238 - 1245