A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption

被引:4
|
作者
Daniel, Renu Mary [1 ]
Thomas, Anitha [2 ]
Rajsingh, Elijah Blessing [3 ]
Silas, Salaja [3 ]
机构
[1] Rajagiri Sch Engn & Technol, Dept Comp Sci & Engn, Cochin 682039, Kerala, India
[2] Bishop Abraham Mem Coll, Dept Math, Pathanamthitta 689597, Kerala, India
[3] Karunya Inst Technol & Sci, Dept Comp Sci & Engn, Coimbatore 641114, Tamil Nadu, India
关键词
Strengthened eCK; Identity based-AKA; CDH; Intermediate result leakage; Pairing-free; Public key replacement attacks; EXCHANGE;
D O I
10.1016/j.ic.2023.105067
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An Authenticated Key Agreement (AKA) protocol enables two communicating parties to compute a session key with equal partnership, such that each entity is assured of the authenticity of its peer. Identity-based AKA (ID-AKA) protocols facilitate implicit authentication of the participating entities, without certificate verification. However, most of the existing ID-AKA schemes are proven secure based on the strong Gap Diffie-Hellman (GDH) assumption. Currently, there are no known implementation methods to realize the GDH assumption without using bilinear pairings. Further, none of the existing ID-AKA protocols have provable security against practical attacks due to intermediate result leakages. To this end, we propose a purely pairing-free ID-AKA protocol based on the Computational Diffie-Hellman assumption. The protocol offers provable security under the strengthened eCK (seCK) model that captures attacks resulting from intermediate result leakages. Comparative analysis with other ID-AKA protocols suggests that the proposed protocol satisfies stronger security requirements, without the gap assumption.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] eCK-Security Authenticated Key Agreement Protocol Based on CDH Assumption
    Liu, Mengzhi
    Zhao, Yanli
    Chen, Shuying
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 213 - 216
  • [2] Provably secure authenticated key agreement protocol based on hierarchical identity
    Cao, Chen-Lei
    Liu, Ming-Qi
    Zhang, Ru
    Yang, Yi-Xian
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2014, 36 (12): : 2848 - 2854
  • [3] A strongly secure identity-based authenticated key agreement protocol without pairings under the GDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3167 - 3179
  • [4] Provably secure authenticated key exchange protocol under the CDH assumption
    Zhao, Jianjie
    Gu, Dawu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (11) : 2297 - 2304
  • [5] A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption
    Sun, Haiyan
    Wen, Qiaoyan
    Li, Wenmin
    SCIENCE CHINA-INFORMATION SCIENCES, 2016, 59 (03)
  • [6] A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption
    Haiyan SUN
    Qiaoyan WEN
    Wenmin LI
    Science China(Information Sciences), 2016, 59 (03) : 107 - 122
  • [7] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [8] Identity based authenticated group key agreement protocol
    Reddy, KC
    Nalla, D
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2002, PROCEEDINGS, 2002, 2551 : 215 - 233
  • [9] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [10] Three-party secure authenticated key agreement protocol based on identity sign
    Li, Ning
    Yeap, Tet
    Yu, Chong xiu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 103 - 105