Identity - Based Multiple Key Agreement Scheme

被引:0
作者
Dehkordi, Massoud Hadian [1 ,3 ]
Alimoradi, Reza [1 ,2 ]
机构
[1] Iran Univ Sci & Technol, Dept Math Sci, Tehran, Iran
[2] Univ Qom, Fac Sci, Qom, Iran
[3] Iran Univ Sci & Technol, Sch Math Sci, Tehran, Iran
关键词
Multiple key agreement; pairing; zero - knowledge proof; identity - based cryptosystems; PROTOCOL;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to protect some important information communicated through an insecure network, a common hidden key must be used. One can produce the common hidden key using key agreement protocols; and this helps to have high security in modern data networks. Today, the designers of public key cryptography protocols try to set the public identity of a system's users (like their email addresses) as their public key. This not only makes a cryptographic protocol more efficient but also decreases its cost. These protocols are called "identity - based". In this article, an identity - based multiple key agreement scheme will be presented; this scheme uses the challenge - response method to do the verification. While the number of random values produced in our scheme is the same as other schemes, the number of keys generated in this scheme is much more than what many other key agreement schemes produce,. Therefore, we will have less computational complexities campered with other schems. In this paper, we consider the security of our scheme and consequently, we will show that it satisfies many security conditions such as strong security.
引用
收藏
页码:2392 / 2402
页数:11
相关论文
共 26 条
[1]  
Allam AM, 2003, PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, P516
[2]  
[Anonymous], 1998, PROC 8 NAT C INFORM
[3]  
[Anonymous], 2003113 CRYPT EPRINT
[4]  
[Anonymous], 2004, P ISFST 04 2004 INT
[5]   Efficient identity-based authenticated key agreement protocol from pairings [J].
Choie, YJ ;
Jeong, E ;
Lee, E .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) :179-188
[6]  
Chow SSM, 2007, LECT NOTES COMPUT SC, V4779, P203
[7]   Zero-Knowledge Identification Scheme Based on Weil Pairing [J].
Dehkordi, Massoud Hadian ;
Alimoradi, Reza .
LOBACHEVSKII JOURNAL OF MATHEMATICS, 2009, 30 (03) :203-207
[8]  
Dehkordi MH, 2009, DISCRET MATH ALGORIT, V1, P369, DOI 10.1142/S1793830909000294
[9]  
Feige U., 1988, Journal of Cryptology, V1, P77, DOI 10.1007/BF02351717
[10]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194