Provably secure identity-based authenticated key agreement protocols in multiple PKG environment

被引:0
作者
Xia S. [1 ,3 ]
Quan J.-X. [2 ]
Han W.-B. [1 ]
机构
[1] Information Engineering Institute, PLA Information Engineering University
[2] Jiangnan Institute of Technology
[3] Electronic Engineering Institute PLA
来源
Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology | 2010年 / 32卷 / 10期
关键词
Authenticated Key Agreement (AKA); Bilinear pairing; Cryptography; ID-Based; Multiple Private Key Generator (PKG) environment; Trapdoor test technology;
D O I
10.3724/SP.J.1146.2009.01382
中图分类号
学科分类号
摘要
Most available identity-based authenticated key agreement protocols require that both protocol participants are from the same PKG(Private Key Generator) environment. However, safe communication is requisite between protocol participants that are from different PKG environment in practice. In this paper, a new identity-based AKA (Authenticated Key Agreement) protocol is proposed in multiple PKG environment, which makes use of a new technique called twin Diffie-Hellman problem. Moreover, the security of the proposed protocol can be reduced to the standard CDH and BDH assumption in the eCK model, which makes use of the trapdoor test" technology proposed by Cash et al in Eurocrypt 2008."
引用
收藏
页码:2393 / 2399
页数:6
相关论文
共 10 条
[1]  
Shamir A., Identity based cryptosystems and signature schemes, CRYPTO'84, pp. 47-53, (1984)
[2]  
Boneh D., Franklin M., Identity based encryption from the Weil pairing, CRYPTO'01, pp. 213-229, (2001)
[3]  
Chen L., Kudla C., Identity based authenticated key agreement protocols from pairing, 16th IEEE Security Foundations Workshop, pp. 219-233, (2003)
[4]  
McCullagh N., Barreto P.S.L.M., A new two-party identity-based authenticated key agreement, pp. 262-274, (2005)
[5]  
Cash D., Kiltz E., Shoup V., The twin diffie-hellman problem and applications, EUROCRYPT2008, pp. 127-145, (2008)
[6]  
Huang H., Cao Z.-F., An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem, ASIACCS 2009, pp. 363-368, (2009)
[7]  
Canetti R., Krawczyk H., Analysis of key-exchange protocols and their use for building secure channels, EUROCRYPT 2001, pp. 453-474, (2001)
[8]  
LaMacchia B., Lauter K., Mityagin A., Stronger security of authenticated key exchange, ProvSec 2007, pp. 1-16, (2007)
[9]  
Ustaoglu B., Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS, Designs, Codes and Cryptography, 46, 3, pp. 329-342, (2008)
[10]  
Chow S.S.M., Choo K.R., Strongly-secure identity-based key agreement and anonymous extension, (2007)