An improved two-party identity-based authenticated key agreement protocol using pairings

被引:36
|
作者
Hoelbl, Marko [1 ]
Welzer, Tatjana [1 ]
Brumen, Bostjan [1 ]
机构
[1] Univ Maribor, Fac Elect Engn & Comp Sci, SLO-2000 Maribor, Slovenia
关键词
Authentication; Key agreement; Identity-based; Bilinear pairing; Cryptography; Security; SECURITY;
D O I
10.1016/j.jcss.2011.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Two-party authenticated key agreement protocols using pairings have gained much attention in the cryptographic community. Several protocols of this type where proposed in the past of which many were found to be flawed. This resulted in attacks or the inability to conform to security attributes. In this paper, we propose an efficient identity-based authenticated key agreement protocol employing pairings which employs a variant of a signature scheme and conforms to security attributes. Additionally, existing competitive and the proposed protocol are compared regarding efficiency and security. The criteria for efficiency are defined in this paper, whereas the criteria for security are defined by the fulfilment of security attributes from literature. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:142 / 150
页数:9
相关论文
共 50 条
  • [1] A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 287 - 294
  • [2] An Improved Identity-based Authenticated Key Agreement Protocol Using Pairings
    Zhang, Jianzhong
    Wu, Zuoshun
    Li, Yong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 45 - 49
  • [3] Two improved two-party identity-based authenticated key agreement protocols
    Holbl, Marko
    Welzer, Tatjana
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1056 - 1060
  • [4] Identity-based authenticated key agreement protocol for two-party in the standard model
    Ren, Yong-Jun
    Wang, Jian-Dong
    Zhuang, Yi
    Wang, Jian
    Xu, Da-Zhuan
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2010, 30 (02): : 174 - 178
  • [5] A new two-party identity-based authenticated key agreement
    McCullagh, N
    Barreto, PSLM
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 262 - 274
  • [6] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [7] A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    Vijayakumar, Pandi
    Kumar, Neeraj
    Park, YoHan
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 1732 - 1741
  • [8] Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments
    Li, Yuting
    Cheng, Qingfeng
    Shi, Wenbo
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [9] A Two-Party Identity-Based Key Agreement Protocol with Explicit Authentication
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [10] Efficient identity-based authenticated key agreement protocol from pairings
    Choie, YJ
    Jeong, E
    Lee, E
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 179 - 188