A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles

被引:0
|
作者
Hai-Bo Tian
Willy Susilo
Yang Ming
Yu-Min Wang
机构
[1] Sun Yat-Sen University,School of Information Science and Technology
[2] Guangdong Key Laboratory of Information Security Technology,Centre for Computer and Information Security Research (CCISR)
[3] School of Computer Science and Software Engineering University of Wollongong,School of Information Engineering
[4] Chang’an University,State Key Laboratory on ISN
[5] Xidian University,undefined
关键词
cryptography; identity-based; key agreement; random oracles;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.
引用
收藏
页码:832 / 842
页数:10
相关论文
共 50 条
  • [1] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    田海博
    Willy Susilo
    明洋
    王育民
    JournalofComputerScience&Technology, 2008, (05) : 832 - 842
  • [2] A provable secure ID-based explicit authenticated key agreement protocol without random oracles
    Tian, Hai-Bo
    Susilo, Willy
    Ming, Yang
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (05) : 832 - 842
  • [3] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [4] Efficient ID-based Key Agreement Protocol under the DLDH Assumption Without Random Oracles
    Moriyama, Daisuke
    Doi, Hiroshi
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 330 - 335
  • [5] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [6] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (09) : 1252 - 1269
  • [7] Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random Oracles
    Ishibashi, Ren
    Yoneyama, Kazuki
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 3 - 27
  • [8] An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
    Tan, Zuowen
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 21 - 28
  • [9] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    Journal of Shanghai Jiaotong University, 2007, (02) : 247 - 249
  • [10] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456