A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles

被引:0
|
作者
Hai-Bo Tian
Willy Susilo
Yang Ming
Yu-Min Wang
机构
[1] Sun Yat-Sen University,School of Information Science and Technology
[2] Guangdong Key Laboratory of Information Security Technology,Centre for Computer and Information Security Research (CCISR)
[3] School of Computer Science and Software Engineering University of Wollongong,School of Information Engineering
[4] Chang’an University,State Key Laboratory on ISN
[5] Xidian University,undefined
关键词
cryptography; identity-based; key agreement; random oracles;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.
引用
收藏
页码:832 / 842
页数:10
相关论文
共 50 条
  • [42] An Efficient and Secure, ID-based Authenticated, Asymmetric Group Key Agreement Protocol for Ubiquitous Pay-TV Networks
    Khatoon, Shaheena
    Rahman, Sk Md Mizanur
    Tso, Raylin
    Alhamid, Mohammed F.
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1387 - 1395
  • [43] A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Yu, Ching-Wen
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (03) : 915 - 932
  • [44] A provably secure dynamic ID-based authenticated key agreement framework for mobile edge computing without a trusted party
    Mishra, Dheerendra
    Dharminder, Dharminder
    Yadav, Preeti
    Rao, Y. Sreenivasa
    Vijayakumar, Pandi
    Kumar, Neeraj
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [45] Two-pass ID-based authenticated key agreement protocol with key confirmation using pairings
    Wang, Shengbao
    Cao, Zhenfu
    Bao, Haiyong
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 109 - +
  • [46] A round-optimal three-party ID-based authenticated key agreement protocol
    Shim, Kyung-Ah
    INFORMATION SCIENCES, 2012, 186 (01) : 239 - 248
  • [47] Strongly Unforgeable ID-Based Signatures without Random Oracles
    Sato, Chifumi
    Okamoto, Takeshi
    Okamoto, Eiji
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS: 5TH INTERNATIONAL CONFERENCE, ISPEC 2009, 2009, 5451 : 35 - +
  • [48] Further analysis of ID-based authenticated group key agreement protocol from bilinear maps
    Shim, Kyung-Ah
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (01) : 295 - 298
  • [49] IDOAKE: strongly secure ID-based one-pass authenticated key exchange protocol
    Huang, Hai
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1153 - 1161
  • [50] Two ID-based authenticated schemes with key agreement for mobile environments
    Chou, Chih-Ho
    Tsai, Kuo-Yu
    Lu, Chung-Fu
    JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 973 - 988