An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices

被引:48
作者
Zhu, Robert W. [1 ]
Yang, Guomin [1 ]
Wong, Duncan S. [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
关键词
D O I
10.1016/j.tcs.2007.02.021
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
For an ID-based key exchange (KE) protocol, KGS forward secrecy is about the protection of previously established session keys after the master secret key of the Key Generation Server (KGS) is compromised. This is the strongest notion of forward secrecy that one can provide for an ID-based KE protocol. Among all the comparable protocols, there are only a few of them that provide this level of forward secrecy, and all of these protocols require expensive bilinear pairing operations and map-to-point hash operations that may not be suitable for implementation on low-power devices such as sensors. In this paper, we propose a new ID-based KE protocol which does not need any pairing or map-to-point hash operations. It also supports the strongest KGS forward secrecy. On its performance, we show that it is faster than previously proposed protocols in this category. Our protocol is a signature-based one, in which the signature scheme is a variant of a scheme proposed by Bellare et al. in Eurocrypt 2004. We show that the variant we proposed is secure, and also requires either less storage space or runtime computation than the original scheme. (c) 2007 Elsevier B.V. All rights reserved.
引用
收藏
页码:198 / 207
页数:10
相关论文
共 30 条
[1]  
[Anonymous], 2003, INF SECUR CRYTOGR
[2]  
[Anonymous], 1998, P 30 ANN ACM S THEOR
[3]  
Barreto PSLM, 2005, LECT NOTES COMPUT SC, V3788, P515
[4]  
Barreto PSLM, 2004, LECT NOTES COMPUT SC, V3006, P17
[5]  
Barreto PSLM, 2002, LECT NOTES COMPUT SC, V2442, P354
[6]  
Bellare M, 2004, LECT NOTES COMPUT SC, V3027, P268
[7]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[8]  
Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
[9]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[10]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56