RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol

被引:0
|
作者
LI Yang [1 ]
ZHU Jianming [1 ]
ZHANG Ning [1 ]
WANG Xiuli [1 ]
ZHANG Yaoqi [1 ]
机构
[1] College of Information, Central University of Finance and Economics
基金
中国国家自然科学基金;
关键词
Authenticated key agreement; ID-based; Provable security; Se CK model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
摘要
Based on revisiting the RYY+Identitybased(ID-Based) key agreement protocol, we find it’s vulnerable to Intermediate results leakage(IRL) and Keycompromise impersonation(KCI) attack. A novel protocol called RYY++is proposed to make up for its deficiencies.Our protocol follows the Full dual exponential challenge response(FDCR-1) scheme to ensure the signature change every time, so the master public key of Private key generator(PKG) joined in signature generation can guarantee two parties trust each other. The RYY++protocol is also proven to be secure in the Strengthened extended Canetti–Krawczyk(Se CK) model which provides better support for adversary’s query and has an advantage over most existing protocols on security and efficiency.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [31] Identity-based authenticated key agreement protocol cross autonomous domains
    Zhang, Xue
    Li, Guangsong
    Han, Wenbao
    Ji, Huifang
    Hu, Hongyu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2015, 47 (04): : 125 - 131
  • [32] One round identity-based authenticated conference key agreement protocol
    Kim, JS
    Kim, HC
    Ha, KJ
    Yoo, KY
    UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 407 - 416
  • [33] Efficient identity-based authenticated key agreement protocol from pairings
    Choie, YJ
    Jeong, E
    Lee, E
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 179 - 188
  • [34] An identity-based authenticated key agreement protocol without bilinear pairing
    Cao, Xue-Fei
    Kou, Wei-Dong
    Fan, Kai
    Zhang, Jun
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (05): : 1241 - 1244
  • [35] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [36] A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3167 - 3179
  • [37] A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings
    Gupta, Daya Sagar
    Islam, S. K. Hafizul
    Obaidat, Mohammad S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 1 - 11
  • [38] A strongly secure identity-based authenticated group key exchange protocol
    TENG JiKai
    WU ChuanKun
    TANG ChunMing
    TIAN YouLiang
    ScienceChina(InformationSciences), 2015, 58 (09) : 98 - 109
  • [39] A strongly secure identity-based authenticated group key exchange protocol
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    Tian YouLiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (09) : 1 - 12
  • [40] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    NI Liang
    CHEN GongLiang
    LI JianHua
    HAO YanYan
    ScienceChina(InformationSciences), 2013, 56 (08) : 189 - 202