A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles

被引:0
|
作者
Hai-Bo Tian
Willy Susilo
Yang Ming
Yu-Min Wang
机构
[1] Sun Yat-Sen University,School of Information Science and Technology
[2] Guangdong Key Laboratory of Information Security Technology,Centre for Computer and Information Security Research (CCISR)
[3] School of Computer Science and Software Engineering University of Wollongong,School of Information Engineering
[4] Chang’an University,State Key Laboratory on ISN
[5] Xidian University,undefined
关键词
cryptography; identity-based; key agreement; random oracles;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.
引用
收藏
页码:832 / 842
页数:10
相关论文
共 50 条
  • [21] Efficient ID-based authenticated key agreement protocol based on Weil pairing
    Shim, K
    ELECTRONICS LETTERS, 2003, 39 (08) : 653 - 654
  • [22] Strongly secure ID-based authenticated key agreement protocol for mobile multi-server environments
    Tseng, Yuh-Min
    Huang, Sen-Shan
    You, Meng-Lin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (11)
  • [23] An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles
    Moriyama, Daisuke
    Okamoto, Tatsuaki
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 154 - +
  • [24] An efficient strongly secure authenticated key exchange protocol without random oracles
    Yang, Zheng
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (08) : 1461 - 1473
  • [25] ID-based authenticated group key agreement secure against insider attacks
    Choi, Kyu Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1828 - 1830
  • [26] An eCK-secure Authenticated Key Exchange Protocol without Random Oracles
    Moriyama, Daisuke
    Okamoto, Tatsuaki
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (03): : 607 - 625
  • [27] Efficient ID-Based One Round Authenticated Group Key Agreement Protocol
    Shi, Yijuan
    Chen, Gongliang
    Li, Jianhua
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 167 - 170
  • [28] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [29] ID-based authenticated multiple-key agreement protocol from pairings
    Kim, KW
    Ryu, EK
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 672 - 680
  • [30] An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
    陆荣幸
    曹珍富
    苏仁旺
    柴震川
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 205 - 209