A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges

被引:230
作者
Cao, Xuefei [1 ]
Kou, Weidong [2 ]
Du, Xiaoni [3 ]
机构
[1] Duke Univ, Dept Comp Sci, Durham, NC 27706 USA
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
[3] NW Normal Univ, Coll Math & Informat Sci, Lanzhou, Peoples R China
关键词
Identity-based; Authenticated key agreement; Elliptic curve; Bilinear pairing; Modular approach;
D O I
10.1016/j.ins.2010.04.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Based on the computational Diffie-Hellman problem, this paper proposes an identity-based authenticated key agreement protocol which removes bilinear pairings. Compared with previous protocols, the new protocol minimizes message exchange time with no extra cost. The protocol provides strong security guarantees including key compromise impersonation resilience, perfect forward secrecy, and master key forward secrecy. A security proof with the modular approach in the modified Bellare-Rogaway model is also provided. Crown Copyright (C) 2010 Published by Elsevier Inc. All rights reserved.
引用
收藏
页码:2895 / 2903
页数:9
相关论文
共 21 条
[1]  
[Anonymous], 1993, CCS
[2]  
[Anonymous], P 6 IMA INT C CRYPT
[3]  
[Anonymous], P TOP CRYPT CT RSA
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]   Identity-Based Anonymous Remote Authentication for Value-Added Services in Mobile Networks [J].
Cao, Xuefei ;
Zeng, Xingwen ;
Kou, Weidong ;
Hu, Liangbing .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (07) :3508-3517
[6]   Identify-Based Authenticated Key Agreement Protocols without Bilinear Pairings [J].
Cao, Xuefei ;
Kou, Weidong ;
Yu, Yong ;
Sun, Rong .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (12) :3833-3836
[7]   Certificateless Threshold Ring Signature [J].
Chang, Shuang ;
Wong, Duncan S. ;
Mu, Yi ;
Zhang, Zhenfeng .
INFORMATION SCIENCES, 2009, 179 (20) :3685-3696
[8]   Identity-based key agreement protocols from pairings [J].
Chen, L. ;
Cheng, Z. ;
Smart, N. P. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) :213-241
[9]   Identity based authenticated key agreement protocols from pairings [J].
Chen, LQ ;
Kudla, C .
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2003, :219-233
[10]   Efficient identity-based authenticated key agreement protocol from pairings [J].
Choie, YJ ;
Jeong, E ;
Lee, E .
APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) :179-188