Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple key agreement; identity-based cryptography; forward security; mutual security; EXCHANGE;
D O I
10.3837/tiis.2012.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.
引用
收藏
页码:1982 / 1997
页数:16
相关论文
共 50 条
  • [31] Analysis and improvement of identity-based authenticated key agreement
    Liu, Zhen-Hua
    Hu, Yu-Pu
    Mu, Ning-Bo
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (10): : 1194 - 1198
  • [32] Identity-based authenticated asymmetric group key agreement
    Tan, Yu'an, 1727, Science Press (51):
  • [33] Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Li, Yuting
    Cheng, Qingfeng
    Shi, Wenbo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [34] An improved identity-based key agreement protocol and its security proof
    Wang, Shengbao
    Cao, Zhenfu
    Choo, Kim-Kwang Raymond
    Wang, Lihua
    INFORMATION SCIENCES, 2009, 179 (03) : 307 - 318
  • [35] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [36] An efficient pairing-free identity-based authenticated group key agreement protocol
    Tan, Zuowen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 534 - 545
  • [37] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    Chinese Journal of Electronics, 2015, 24 (02) : 332 - 337
  • [38] Identity-based authenticated key agreement protocol for two-party in the standard model
    Ren, Yong-Jun
    Wang, Jian-Dong
    Zhuang, Yi
    Wang, Jian
    Xu, Da-Zhuan
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2010, 30 (02): : 174 - 178
  • [39] An improved pairing-free identity-based authenticated key agreement protocol based on ECC
    Islam, S. K. Hafizul
    Biswas, G. P.
    INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND SYSTEM DESIGN 2011, 2012, 30 : 499 - 507
  • [40] Cryptanalysis of an identity-based authenticated key exchange protocol
    Hatri, Younes
    Otmani, Ayoub
    Guenda, Kenza
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (03)