A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme

被引:1
|
作者
Cai, Yang [2 ]
Xu, Qiuliang [2 ]
Zheng, Zhihua [1 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan 250014, Peoples R China
[2] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
来源
PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012) | 2012年
基金
高等学校博士学科点专项科研基金; 中国国家自然科学基金;
关键词
key agreement protocol; identity-based cryptography; standard model; Computational Bilinear Diffie-Hellman; ENCRYPTION;
D O I
10.1109/CIS.2012.147
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we present a two-party key agreement protocol, which is secure in standard model. By using the Goldreich-Levin hardcore predicate, we reduce the security of our scheme to Computational Bilinear Diffie-Hellman assumption, and a proof is given. Furthermore, with the consistency of messages exchanged publicly verifiable, our scheme achieves most of the known security attributes.
引用
收藏
页码:636 / 640
页数:5
相关论文
共 50 条
  • [1] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [2] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [3] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [4] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    Chinese Journal of Electronics, 2015, 24 (02) : 332 - 337
  • [5] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [6] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    中国通信, 2007, 4 (04) : 11 - 22
  • [7] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [8] Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC
    Farash, Mohammad Dabzinejad
    Attari, Mahmoud Ahmadian
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 5 (01): : 55 - 70
  • [9] Provably secure identity-based authenticated key agreement protocols with malicious private key generators
    Guo, Hua
    Li, Zhoujun
    Mu, Yi
    Zhang, Xiyong
    INFORMATION SCIENCES, 2011, 181 (03) : 628 - 647
  • [10] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854