Non-Interactive Authenticated Key Agreement over the Mobile Communication Network

被引:3
作者
Wu, Tzong-Sun [1 ]
Lin, Han-Yu [1 ]
机构
[1] Natl Taiwan Ocean Univ, Dept Comp Sci & Engn, Keelung 202, Taiwan
关键词
Bilinear pairings; Key agreement; Non-interactive; Self-certified public key; PROTOCOL;
D O I
10.1007/s11036-013-0440-4
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A key agreement scheme is an important technique to establish a common secret over an insecure communication environment such as the Internet. In this paper, we elaborate on the merits of self-certified public key systems and bilinear pairing cryptosystems to propose an efficient and secure non-interactive authenticated key agreement (NI-AKA) scheme. The security of our scheme is proved to be computationally equivalent to the bilinear Diffie-Hellman problem (BDHP). In addition, the proposed scheme has the following advantages: (i) Two participants can easily establish a shared secret key between them without further interactions, so as to greatly reduce the possibility of leaking any security information of the shared secret key. (ii) Combining with self-certified public key systems, the proposed scheme makes it unnecessary to verify each other's public key in advance, since the authenticity of the public keys is simultaneously validated when the mutually shared secret key is correctly established. (iii) Based on the bilinear pairing cryptosystems over elliptic curves, our scheme is suitable for mobile applications with limited computing power and insufficient storage space, such as PDAs and cellular phones, etc.
引用
收藏
页码:594 / 599
页数:6
相关论文
共 26 条
[1]  
[Anonymous], 1998, 148883 ISOIEC
[2]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[3]  
[Anonymous], 2001, 95948 ISOIEC
[4]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[5]  
Boneh D, 2001, ADV CRYPTOLOGY ASIAC, P514, DOI [DOI 10.1007/S00145-004-0314-9, 10.1007/s00145-004-0314-9]
[6]  
Boneh D., 2001, ADV CRYPTOLOGY CRYPT, V2139, DOI DOI 10.1109/JSAC.2009.090502
[7]  
Cary M, 2003, LECT NOTES COMPUT SC, V2729, P500
[8]   Efficient identity-based authenticated key agreement protocol from pairings [J].
Choie, YJ ;
Jeong, E ;
Lee, E .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) :179-188
[9]   Provably secure non-interactive key distribution based on pairings [J].
Dupont, R ;
Enge, A .
DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) :270-276
[10]   Hierarchical ID-based cryptography [J].
Gentry, C ;
Silverberg, A .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 :548-566