Efficient identity-based authenticated key agreement protocol from pairings

被引:49
作者
Choie, YJ [1 ]
Jeong, E [1 ]
Lee, E [1 ]
机构
[1] Pohang Univ Sci & Technol, Dept Math, Pohang 790784, South Korea
关键词
identity-based encryption; key agreement protocol; bilinear pairing;
D O I
10.1016/j.amc.2003.12.092
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Since Boneh and Franklin [Advances in cryptology-CRYPTO LNCS 2139 (2001) 213] gave the first feasible solutions for identity-based encryption using Weil pairing on elliptic curves, many identity-based key agreement protocols and signature schemes using bilinear pairing have been suggested. As argued in [Designs, Codes and Cryptography 28 (2003) 119], secure and efficient key agreement protocols should provide certain security attributes and low communication overhead. The communication overhead depends on the number of key components transmitted by each entity. Until now, there is no secure two-pass ID-based authenticated key agreement protocol, which provides perfect secrecy and transmits only one key component. Here, we propose a few ID-based authenticated key agreement protocols based on a bilinear pairing. Our final protocol is a two-pass authenticated key agreement protocol with required security attributes and minimal communication overhead. (C) 2004 Elsevier Inc. All rights reserved.
引用
收藏
页码:179 / 188
页数:10
相关论文
共 13 条
[1]  
Blake-Wilson S, 1997, LECT NOTES COMPUT SC, V1355, P30, DOI 10.1007/BFb0024447
[2]  
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1560, P154
[3]  
Boneh D., 2001, LNCS, P514, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[4]  
BONEH D, 2001, LNCS, V2139
[5]  
CHEN I, IDENTITY BASED AUTHE
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]  
Joux A, 2000, LECT NOTES COMPUT SC, V1838, P385
[8]   An efficient protocol for authenticated key agreement [J].
Law, L ;
Menezes, A ;
Qu, MH ;
Solinas, J ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2003, 28 (02) :119-134
[9]   Key control in key agreement protocols [J].
Mitchell, CJ ;
Ward, M ;
Wilson, P .
ELECTRONICS LETTERS, 1998, 34 (10) :980-981
[10]  
NALLA D, 2003144 CRYPT EPR AR