Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security

被引:0
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Multiple key agreement; identity-based cryptography; forward security; mutual security; EXCHANGE;
D O I
10.3837/tiis.2012.08.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated multiple key agreement protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In 2011, Dehkordi et al. proposed an identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Dehkordi et al.'s protocol is vulnerable to impersonation attacks. Furthermore, we have found that their protocol cannot provide perfect forward security or mutual security. Then we propose an identity-based authenticated multiple key agreement protocol which removes the weaknesses of the Dehkordi et al.'s protocol. Compared with the multiple key agreement protocols in the literature, the proposed protocol is more efficient and holds stronger security.
引用
收藏
页码:1982 / 1997
页数:16
相关论文
共 50 条
  • [41] A resilient identity-based authenticated key exchange protocol
    Elashry, Ibrahim
    Mu, Yi
    Susilo, Willy
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2279 - 2290
  • [42] Security analysis of a pairing-free identity-based authenticated group key agreement protocol for imbalanced mobile networks
    Cheng, Qingfeng
    International Journal of Network Security, 2015, 17 (04) : 494 - 496
  • [43] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [44] Certificateless and identity-based authenticated asymmetric group key agreement
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Deng, Hua
    Li, Jiangtao
    Liu, Jianwei
    Shi, Wenchang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (05) : 559 - 576
  • [45] Certificateless and identity-based authenticated asymmetric group key agreement
    Lei Zhang
    Qianhong Wu
    Bo Qin
    Hua Deng
    Jiangtao Li
    Jianwei Liu
    Wenchang Shi
    International Journal of Information Security, 2017, 16 : 559 - 576
  • [46] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [47] Identity-based authenticated key agreement protocols in the standard model
    Ren, Yongjun
    Wang, Jiandong
    Wang, Jian
    Xu, Dazhuan
    Zhuang, Yi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1604 - 1610
  • [48] Identity based authenticated group key agreement protocol
    Reddy, KC
    Nalla, D
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
  • [49] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [50] Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity
    Hassan, Alzubair
    Omala, Anyembe Andrew
    Ali, Mohamed
    Jin, Chunhua
    Li, Fagen
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03): : 890 - 902