RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol

被引:0
|
作者
LI Yang [1 ]
ZHU Jianming [1 ]
ZHANG Ning [1 ]
WANG Xiuli [1 ]
ZHANG Yaoqi [1 ]
机构
[1] College of Information, Central University of Finance and Economics
基金
中国国家自然科学基金;
关键词
Authenticated key agreement; ID-based; Provable security; Se CK model;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
摘要
Based on revisiting the RYY+Identitybased(ID-Based) key agreement protocol, we find it’s vulnerable to Intermediate results leakage(IRL) and Keycompromise impersonation(KCI) attack. A novel protocol called RYY++is proposed to make up for its deficiencies.Our protocol follows the Full dual exponential challenge response(FDCR-1) scheme to ensure the signature change every time, so the master public key of Private key generator(PKG) joined in signature generation can guarantee two parties trust each other. The RYY++protocol is also proven to be secure in the Strengthened extended Canetti–Krawczyk(Se CK) model which provides better support for adversary’s query and has an advantage over most existing protocols on security and efficiency.
引用
收藏
页码:332 / 337
页数:6
相关论文
共 50 条
  • [41] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Liang Ni
    GongLiang Chen
    JianHua Li
    YanYan Hao
    Science China Information Sciences, 2013, 56 : 1 - 14
  • [42] Strongly Secure Identity-based Authenticated Key Agreement for Wireless Sensor Network
    Shui, Guohong
    Chen, Ming
    DISASTER ADVANCES, 2012, 5 : 187 - 195
  • [43] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Ni Liang
    Chen GongLiang
    Li JianHua
    Hao YanYan
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (08) : 1 - 14
  • [44] Provably secure authenticated tree based group key agreement
    Dutta, R
    Barua, R
    Sarkar, P
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2004, 3269 : 92 - 104
  • [45] A Pairing-Free Identity-Based Authenticated Key Agreement Protocol for MANET
    Khatoon, Shaheena
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (06): : 135 - 140
  • [46] Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security
    Tan, Zuowen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (08): : 1982 - 1997
  • [47] An authenticated 3-round identity-based group key agreement protocol
    Yao, Gang
    Wang, Hongji
    Jiang, Qingshan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 538 - +
  • [48] Post-quantum identity-based authenticated multiple key agreement protocol
    Yang, Yang
    Yuan, Hongji
    Yan, Linbo
    Ruan, Yinglan
    ETRI JOURNAL, 2023, 45 (06) : 1090 - 1102
  • [49] A provably secure authenticated key agreement protocol for industrial sensor network system
    Thakur, Garima
    Obaidat, Mohammad S.
    Sharma, Piyush
    Prajapat, Sunil
    Kumar, Pankaj
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [50] MAKA: Provably Secure Multi-factor Authenticated Key Agreement Protocol
    Liu, Xiaoxue
    Li, Yanping
    Qu, Juan
    Jiang, Qi
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 669 - 677