A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges

被引:229
作者
Cao, Xuefei [1 ]
Kou, Weidong [2 ]
Du, Xiaoni [3 ]
机构
[1] Duke Univ, Dept Comp Sci, Durham, NC 27706 USA
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] NW Normal Univ, Coll Math & Informat Sci, Lanzhou, Peoples R China
关键词
Identity-based; Authenticated key agreement; Elliptic curve; Bilinear pairing; Modular approach;
D O I
10.1016/j.ins.2010.04.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on the computational Diffie-Hellman problem, this paper proposes an identity-based authenticated key agreement protocol which removes bilinear pairings. Compared with previous protocols, the new protocol minimizes message exchange time with no extra cost. The protocol provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy. A security proof with the modular approach in the modified Bellare-Rogaway model is also provided. Crown Copyright (C) 2010 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:2895 / 2903
页数:9
相关论文
共 21 条
  • [1] [Anonymous], 1993, CCS
  • [2] [Anonymous], P 6 IMA INT C CRYPT
  • [3] [Anonymous], P TOP CRYPT CT RSA
  • [4] Identity-based encryption from the Weil pairing
    Boneh, D
    Franklin, M
    [J]. SIAM JOURNAL ON COMPUTING, 2003, 32 (03) : 586 - 615
  • [5] Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks
    Cao, Xuefei
    Zeng, Xingwen
    Kou, Weidong
    Hu, Liangbing
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (07) : 3508 - 3517
  • [6] Identify-Based Authenticated Key Agreement Protocols without Bilinear Pairings
    Cao, Xuefei
    Kou, Weidong
    Yu, Yong
    Sun, Rong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) : 3833 - 3836
  • [7] Certificateless Threshold Ring Signature
    Chang, Shuang
    Wong, Duncan S.
    Mu, Yi
    Zhang, Zhenfeng
    [J]. INFORMATION SCIENCES, 2009, 179 (20) : 3685 - 3696
  • [8] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [9] Identity based authenticated key agreement protocols from pairings
    Chen, LQ
    Kudla, C
    [J]. 16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, : 219 - 233
  • [10] Efficient identity-based authenticated key agreement protocol from pairings
    Choie, YJ
    Jeong, E
    Lee, E
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 179 - 188