Identity-based key agreement protocols from pairings

被引:379
作者
Chen, L. [2 ]
Cheng, Z. [3 ]
Smart, N. P. [1 ]
机构
[1] Univ Bristol, Dept Comp Sci, Bristol BS8 1UB, Avon, England
[2] Hewlett Packard Labs, Bristol BS34 8QZ, Avon, England
[3] Middlesex Univ, Sch Comp Sci, London NW4 4BT, England
关键词
identity based crytography; pairings;
D O I
10.1007/s10207-006-0011-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, a large number of identity-based key agreement protocols from pairings have been proposed. Some of them are elegant and practical. However, the security of this type of protocol has been surprisingly hard to prove, even in the random oracle model. The main issue is that a simulator is not able to deal with reveal queries, because it requires solving either a computational problem or a decisional problem, both of which are generally believed to be hard (i.e., computationally infeasible). The best solution so far for security proofs uses the gap assumption, which means assuming that the existence of a decisional oracle does not change the hardness of the corresponding computational problem. The disadvantage of using this solution to prove security is that such decisional oracles, on which the security proof relies, cannot be performed by any polynomial time algorithm in the real world, because of the hardness of the decisional problem. In this paper we present a method incorporating a built-in decisional function into the protocols. The function transfers a hard decisional problem in the proof to an easy decisional problem. We then discuss the resulting efficiency of the schemes and the relevant security reductions, in the random oracle model, in the context of different pairings one can use. We pay particular attention, unlike most other papers in the area, to the issues which arise when using asymmetric pairings.
引用
收藏
页码:213 / 241
页数:29
相关论文
共 40 条
[1]  
[Anonymous], 2002, Authenticated id-based key exchange and remote log-in with simple token and pin number
[2]  
Bellare M, 1996, LNCS, V1109, P1
[3]  
Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
[4]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[5]  
BONEH D, 2001, LNCS, V2139
[6]  
Boyd C, 2004, LECT NOTES COMPUT SC, V3089, P248
[7]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[8]  
Chen LQ, 2005, LECT NOTES COMPUT SC, V3796, P442
[9]   Identity based authenticated key agreement protocols from pairings [J].
Chen, LQ ;
Kudla, C .
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, :219-233
[10]  
CHENG Z, 2005, IN PRESS INT SECURIT