Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple key agreement; identity-based cryptography; forward security; mutual security; EXCHANGE;
D O I
10.3837/tiis.2012.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.
引用
收藏
页码:1982 / 1997
页数:16
相关论文
共 50 条
  • [1] Escrowable identity-based authenticated key agreement protocol with strong security
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2013, 65 (09) : 1339 - 1349
  • [2] An Efficient Identity-Based Key Agreement Protocol in a Multiple PKG Environment
    ZHOU Huan
    WANG Xiaofeng
    SU Jinshu
    WuhanUniversityJournalofNaturalSciences, 2014, 19 (05) : 455 - 460
  • [3] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia S.
    Quan J.-X.
    Han W.-B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [4] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [5] Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators
    Fujioka, Atsushi
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 192 - 211
  • [6] Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    CHOO Kim-Kwang Raymond
    Science China(Information Sciences), 2009, (08) : 1358 - 1370
  • [7] Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    Wang ShengBao
    Cao ZhenFu
    Cheng ZhaoHui
    Choo, Kim-Kwang Raymond
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (08): : 1358 - 1370
  • [8] Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode
    ShengBao Wang
    ZhenFu Cao
    ZhaoHui Cheng
    Kim-Kwang Raymond Choo
    Science in China Series F: Information Sciences, 2009, 52 : 1358 - 1370
  • [9] Post-quantum identity-based authenticated multiple key agreement protocol
    Yang, Yang
    Yuan, Hongji
    Yan, Linbo
    Ruan, Yinglan
    ETRI JOURNAL, 2023, 45 (06) : 1090 - 1102