Identity based authenticated key agreement protocols from pairings

被引:139
作者
Chen, LQ [1 ]
Kudla, C [1 ]
机构
[1] Hewlett Packard Labs, Bristol BS34 8QZ, Avon, England
来源
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS | 2003年
关键词
D O I
10.1109/CSFW.2003.1212715
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate a number of issues related to identity based authenticated key agreement protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues include how to make protocols efficient; to avoid key escrow by a Trust Authoritiy (TA) who issues identity based private keys for users, and to allow users to use different TAs. We describe a few authenticated key agreement (AK) protocols and AK with key confirmation (AKC) protocols by modifying Smart's AK protocol [26]. We discuss the security of these protocols heuristically and give formal proofs of security for our AK and AKC protocols (using a security model based on the model defined in [3]). We also prove that our AK protocol has the key compromise impersonation property. We also show that our second protocol has the TA forward secrecy property (which we define to mean that the compromise of the TA's private key will not compromise previously established session keys), and we note that this also implies that it has the perfect forward secrecy property.
引用
收藏
页码:219 / 233
页数:15
相关论文
共 28 条
  • [1] ALRIYAMI S, TRIPARTITTE AUTHENTI
  • [2] Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
  • [3] Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
  • [4] Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
  • [5] Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
  • [6] BONEH D, 2001, LNCS, V2139
  • [7] Chen L, 2002, LECT NOTES COMPUT SC, V2433, P322
  • [8] Chen L, 2002, LECT NOTES COMPUT SC, V2437, P260
  • [9] NEW DIRECTIONS IN CRYPTOGRAPHY
    DIFFIE, W
    HELLMAN, ME
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
  • [10] The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
    Frey, G
    Müller, M
    Rück, HG
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (05) : 1717 - 1719