A resilient identity-based authenticated key exchange protocol

被引:10
作者
Elashry, Ibrahim [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
identity-based authenticated key exchange; resiliency; QR assumption; SECURE; ENCRYPTION; AGREEMENT;
D O I
10.1002/sec.1172
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new security notion for key exchange (KE) protocols called resiliency. That is, if a shared secret between a group of parties is compromised or leaked, they can generate another completely new shared secret without the need to set up a new KE session. We present an identity-based authenticated KE protocol that satisfies the resiliency security property. We prove that if an l-bit shared secret key (SSK) is leaked, then two parties P-1 and P-2 can safely generate another shared secret SSK1 without the need to establish a new session. We adjust the unauthenticated adversarial model of the Canetti-Krawczyk to meet this security property and prove the security of the proposed protocol using the Canetti-Krawczyk model based on the quadratic residuosity assumption. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:2279 / 2290
页数:12
相关论文
共 41 条
[1]  
Aiello W., 2004, ACM Transactions on Information and Systems Security, V7, P242, DOI 10.1145/996943.996946
[2]  
Alawatugoda J, 2014, LECT NOTES COMPUT SC, V8544, P258
[3]  
[Anonymous], COURSE COMPUTATIONAL
[4]  
[Anonymous], 2014, ASIACCS
[5]  
[Anonymous], 979831998 ISOIEC
[6]  
[Anonymous], 2005, IACR CRYPTOL EPRINT
[7]  
[Anonymous], P 8 ANN I CRYPT C AD
[8]  
[Anonymous], 2011, RENEW ENERGY POWER Q, DOI DOI 10.24084/REPQJ09.355
[9]  
[Anonymous], LECT NOTES COMPUTER
[10]  
Barua R, 2010, SANKHYA SER A, V72, P226, DOI 10.1007/s13171-010-0010-9