A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings

被引:3
|
作者
Gupta, Daya Sagar [1 ]
Islam, S. K. Hafizul [2 ]
Obaidat, Mohammad S. [3 ,4 ,5 ,6 ]
机构
[1] Shershah Coll Engn Sasaram, Dept Comp Sci & Engn, Sasaram, Bihar, India
[2] Indian Inst Informat Technol Kalyani, Dept Comp Sci & Engn, Kalyani, W Bengal, India
[3] Univ Sharjah, Coll Comp & Informat, Sharjah, U Arab Emirates
[4] Univ Jordan, Korea Adv Inst Sci & Technol, Amman, Jordan
[5] Univ Sci & Technol Beijing, Beijing, Peoples R China
[6] Amity Univ, Noida, India
关键词
Key agreement; Elliptic curve; Hash function; Bilinear pairing; Forward secrecy;
D O I
10.1007/978-3-030-38040-3_1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The modern Internet technology era requires secure key agreement protocols, which are playing a significant role in the field of cryptography and network security. These protocols are mainly designed to establish a common session key between different parties. It can be easily found that various key agreement protocols are designed in the literature. However, many of these protocols are either proven insecure or have a burden of communication and computational cost. Therefore, a more secure key agreement protocol is needed. This paper exhibits an identity-based three-party authenticated key agreement (ID-3PAKA) protocol is devised, which securely and efficiently negotiates a common secret session key among three parties over the Internet. This protocol is based on the elliptic curve cryptography (ECC). It uses the idea of identity-based encryption (IBE) with bilinear pairings. The security of the proposed work is based on the hardness assumption of the discrete logarithm problem (DL) and elliptic curve. Further, we show that the proposed protocol ensures the known security properties of the session key.
引用
收藏
页码:1 / 11
页数:11
相关论文
共 50 条
  • [1] A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 287 - 294
  • [2] Three-party secure authenticated key agreement protocol based on identity sign
    Li, Ning
    Yeap, Tet
    Yu, Chong xiu
    IC-BNMT 2007: PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2007, : 103 - 105
  • [3] Two proposed identity-based three-party authenticated key agreement protocols from pairings
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    COMPUTERS & SECURITY, 2010, 29 (02) : 244 - 252
  • [4] New identity-based three-party authenticated key agreement protocol with provable security
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 927 - 932
  • [5] Strongly secure identity-based authenticated key agreement protocols without bilinear pairings
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    INFORMATION SCIENCES, 2016, 367 : 176 - 193
  • [6] An Improved Identity-based Authenticated Key Agreement Protocol Using Pairings
    Zhang, Jianzhong
    Wu, Zuoshun
    Li, Yong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 45 - 49
  • [7] An improved two-party identity-based authenticated key agreement protocol using pairings
    Hoelbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (01) : 142 - 150
  • [8] Three-Party Password-Based Authenticated Key Exchange Protocol Based on Bilinear Pairings
    Wei, Fushan
    Ma, Chuangui
    Cheng, Qingfeng
    INFORMATION COMPUTING AND APPLICATIONS, 2010, 6377 : 135 - 142
  • [9] Efficient identity-based authenticated key agreement protocol from pairings
    Choie, YJ
    Jeong, E
    Lee, E
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 162 (01) : 179 - 188
  • [10] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38