Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple key agreement; identity-based cryptography; forward security; mutual security; EXCHANGE;
D O I
10.3837/tiis.2012.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.
引用
收藏
页码:1982 / 1997
页数:16
相关论文
共 50 条
  • [21] Efficient identity-based authenticated key agreement protocol from pairings
    Choie, YJ
    Jeong, E
    Lee, E
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 179 - 188
  • [22] An identity-based authenticated key agreement protocol without bilinear pairing
    Cao, Xue-Fei
    Kou, Wei-Dong
    Fan, Kai
    Zhang, Jun
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (05): : 1241 - 1244
  • [23] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [24] Efficient identity-based authenticated multiple key exchange protocol
    Tan, Zuowen
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 191 - 198
  • [25] Efficient identity-based authenticated multiple key exchange protocol
    Chen, Yitao
    Han, Weiwei
    ACTA SCIENTIARUM-TECHNOLOGY, 2013, 35 (04) : 629 - 636
  • [26] More efficient identity-based authenticated key agreement with perfect forward secrecy
    Wang, Shengbao
    Cao, Zhenfu
    Cao, Feng
    Journal of Information and Computational Science, 2007, 4 (01): : 317 - 323
  • [27] Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks
    Dang, Lanjun
    Xu, Jie
    Cao, Xuefei
    Li, Hui
    Chen, Jie
    Zhang, Yueyu
    Fu, Xiaotong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (04)
  • [28] A Pairing-Free Identity-Based Authenticated Key Agreement Protocol for MANET
    Khatoon, Shaheena
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 135 - 140
  • [29] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [30] An authenticated 3-round identity-based group key agreement protocol
    Yao, Gang
    Wang, Hongji
    Jiang, Qingshan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 538 - +