A resilient identity-based authenticated key exchange protocol

被引:10
作者
Elashry, Ibrahim [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
关键词
identity-based authenticated key exchange; resiliency; QR assumption; SECURE; ENCRYPTION; AGREEMENT;
D O I
10.1002/sec.1172
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents a new security notion for key exchange (KE) protocols called resiliency. That is, if a shared secret between a group of parties is compromised or leaked, they can generate another completely new shared secret without the need to set up a new KE session. We present an identity-based authenticated KE protocol that satisfies the resiliency security property. We prove that if an l-bit shared secret key (SSK) is leaked, then two parties P-1 and P-2 can safely generate another shared secret SSK1 without the need to establish a new session. We adjust the unauthenticated adversarial model of the Canetti-Krawczyk to meet this security property and prove the security of the proposed protocol using the Canetti-Krawczyk model based on the quadratic residuosity assumption. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:2279 / 2290
页数:12
相关论文
共 41 条
[41]  
Yang GM, 2012, LECT NOTES COMPUT SC, V7035, P113