A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption

被引:4
|
作者
Daniel, Renu Mary [1 ]
Thomas, Anitha [2 ]
Rajsingh, Elijah Blessing [3 ]
Silas, Salaja [3 ]
机构
[1] Rajagiri Sch Engn & Technol, Dept Comp Sci & Engn, Cochin 682039, Kerala, India
[2] Bishop Abraham Mem Coll, Dept Math, Pathanamthitta 689597, Kerala, India
[3] Karunya Inst Technol & Sci, Dept Comp Sci & Engn, Coimbatore 641114, Tamil Nadu, India
关键词
Strengthened eCK; Identity based-AKA; CDH; Intermediate result leakage; Pairing-free; Public key replacement attacks; EXCHANGE;
D O I
10.1016/j.ic.2023.105067
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An Authenticated Key Agreement (AKA) protocol enables two communicating parties to compute a session key with equal partnership, such that each entity is assured of the authenticity of its peer. Identity-based AKA (ID-AKA) protocols facilitate implicit authentication of the participating entities, without certificate verification. However, most of the existing ID-AKA schemes are proven secure based on the strong Gap Diffie-Hellman (GDH) assumption. Currently, there are no known implementation methods to realize the GDH assumption without using bilinear pairings. Further, none of the existing ID-AKA protocols have provable security against practical attacks due to intermediate result leakages. To this end, we propose a purely pairing-free ID-AKA protocol based on the Computational Diffie-Hellman assumption. The protocol offers provable security under the strengthened eCK (seCK) model that captures attacks resulting from intermediate result leakages. Comparative analysis with other ID-AKA protocols suggests that the proposed protocol satisfies stronger security requirements, without the gap assumption.& COPY; 2023 Elsevier Inc. All rights reserved.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [42] An identity-based authenticated key agreement protocol without bilinear pairing
    Cao, Xue-Fei
    Kou, Wei-Dong
    Fan, Kai
    Zhang, Jun
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2009, 31 (05): : 1241 - 1244
  • [43] A strongly secure identity-based authenticated group key exchange protocol
    TENG JiKai
    WU ChuanKun
    TANG ChunMing
    TIAN YouLiang
    ScienceChina(InformationSciences), 2015, 58 (09) : 98 - 109
  • [44] A strongly secure identity-based authenticated group key exchange protocol
    Teng JiKai
    Wu ChuanKun
    Tang ChunMing
    Tian YouLiang
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (09) : 1 - 12
  • [45] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    NI Liang
    CHEN GongLiang
    LI JianHua
    HAO YanYan
    ScienceChina(InformationSciences), 2013, 56 (08) : 189 - 202
  • [46] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Liang Ni
    GongLiang Chen
    JianHua Li
    YanYan Hao
    Science China Information Sciences, 2013, 56 : 1 - 14
  • [47] Strongly Secure Identity-based Authenticated Key Agreement for Wireless Sensor Network
    Shui, Guohong
    Chen, Ming
    DISASTER ADVANCES, 2012, 5 : 187 - 195
  • [48] Strongly secure identity-based authenticated key agreement protocols in the escrow mode
    Ni Liang
    Chen GongLiang
    Li JianHua
    Hao YanYan
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (08) : 1 - 14
  • [49] Chameleon-based deniable authenticated key agreement protocol secure against forgery
    Ma, Chunbo
    Ao, Jun
    Li, Jianhua
    ONLINE COMMUNITIES AND SOCIAL COMPUTING, PROCEEDINGS, 2007, 4564 : 124 - +
  • [50] A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 287 - 294