A round-optimal three-party ID-based authenticated key agreement protocol

被引:12
|
作者
Shim, Kyung-Ah [1 ]
机构
[1] KT Daedoek 2nd Res Ctr 463 1, Natl Inst Math Sci, Div Fus & Convergence Math Sci, Taejon, South Korea
关键词
Identity-based system; Digital signature; Authenticated key agreement; Collusion Attack Algorithm with k-Traitor problem; Bilinear Diffie-Hellman problem;
D O I
10.1016/j.ins.2011.09.038
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a round-optimal identity-based authenticated key agreement protocol for a three-party setting in which three parties can actually transmit messages simultaneously. We then give its security proof in the random oracle model under the Bilinear Diffie-Hellman assumption. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:239 / 248
页数:10
相关论文
共 50 条
  • [1] Round-optimal ID-based dynamic authenticated group key agreement
    Li F.
    Xie D.
    Yan J.
    Gao W.
    Wang X.A.
    International Journal of High Performance Systems Architecture, 2016, 6 (03) : 153 - 161
  • [2] An ID-based authenticated dynamic group key agreement with optimal round
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    SCIENCE CHINA-INFORMATION SCIENCES, 2012, 55 (11) : 2542 - 2554
  • [3] An ID-based authenticated dynamic group key agreement with optimal round
    TENG JiKai1
    2Graduate University of Chinese Academy of Sciences
    3Faculty of Mathematic and Information Science
    Science China(Information Sciences), 2012, 55 (11) : 2542 - 2554
  • [4] An ID-based authenticated dynamic group key agreement with optimal round
    JiKai Teng
    ChuanKun Wu
    ChunMing Tang
    Science China Information Sciences, 2012, 55 : 2542 - 2554
  • [5] Efficient ID-Based One Round Authenticated Group Key Agreement Protocol
    Shi, Yijuan
    Chen, Gongliang
    Li, Jianhua
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 167 - 170
  • [6] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [7] Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments
    Liu, Chao-Liang
    Tsai, Wang-Jui
    Chang, Ting-Yi
    Liu, Ta-Ming
    SYMMETRY-BASEL, 2018, 10 (04):
  • [8] ID-Based one round authenticated group key agreement protocol with bilinear pairings
    Shi, YJ
    Chen, GL
    Li, JH
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 757 - 761
  • [9] Improvement on the password authenticated three-party key agreement protocol
    Department of Security Technology and Management, Wufeng University, Chiayi 62153, Taiwan
    不详
    不详
    J. Comput. Inf. Syst., 1 (42-48): : 42 - 48
  • [10] Three-party secure authenticated key agreement protocol based on identity sign
    Li, Ning
    Yeap, Tet
    Yu, Chong xiu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 103 - 105