Provably Secure and Efficient Identity-Based Key Agreement Protocol for Independent PKGs Using ECC

被引:0
|
作者
Farash, Mohammad Dabzinejad [1 ]
Attari, Mahmoud Ahmadian [2 ]
机构
[1] Kharazmi Univ, Dept Math & Comp Sci, Tehran, Iran
[2] KN Toosi Univ Technol, Fac Elect & Comp Engn, Tehran, Iran
关键词
Identity-Based Cryptography; Key Agreement Protocol; Elliptic Curve Cryptography; Random Oracle Model;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is generated by a trusted Private Key Generator (PKG). However, it is unrealistic to assume that a single PKG will be responsible for issuing private keys to members of different organizations or a large-scale nation. Hence, it is needed to consider multiple PKG environments with different system parameters. In this paper, we propose an identity-based key agreement protocol among users of different networks with independent PKGs, which makes use of elliptic curves. We prove the security of the proposed protocol in the random oracle model and show that all security attributes are satisfied. We also demonstrate a comparison between our protocol and some related protocols in terms of the communication costs and the execution time. The results show that the execution time of our protocol is less than 10%, and its communication costs are about 50% of the competitor protocols. (C)2013 ISC. All rights reserved.
引用
收藏
页码:55 / 70
页数:16
相关论文
共 50 条
  • [1] An Improved Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li, Yang
    Zhu, Jianming
    Zhang, Wei
    Yang, Xin
    2014 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT (ICMECG), 2014, : 98 - 103
  • [2] A Provably Secure Identity-based Authentication Multiple Key Agreement Protocol
    Tan Zuowen
    CHINA COMMUNICATIONS, 2011, 8 (02) : 26 - 33
  • [3] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme
    Cai, Yang
    Xu, Qiuliang
    Zheng, Zhihua
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
  • [4] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs
    Jin, Zhengping
    Zuo, Huijuan
    Du, Hongzhen
    Wen, Qiaoyan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
  • [5] PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION
    Shao, Shuai
    Tian, Bin
    Wang, Xin
    Li, Yang
    2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS) Vols 1-3, 2012, : 1240 - 1244
  • [6] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    LI Yang
    ZHU Jianming
    ZHANG Ning
    WANG Xiuli
    ZHANG Yaoqi
    Chinese Journal of Electronics, 2015, 24 (02) : 332 - 337
  • [7] RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol
    Li Yang
    Zhu Jianming
    Zhang Ning
    Wang Xiuli
    Zhang Yaoqi
    CHINESE JOURNAL OF ELECTRONICS, 2015, 24 (02) : 332 - 337
  • [8] Provably Secure Identity-based Group Key Exchange Protocol
    SangJae Moon
    中国通信, 2007, 4 (04) : 11 - 22
  • [9] Provably Secure Identity-based Group Key Exchange Protocol
    Cao Chunjie
    Ma Jianfeng
    SangJae Moon
    CHINA COMMUNICATIONS, 2007, 4 (04) : 11 - 22
  • [10] A new provably secure authentication and key agreement protocol for SIP using ECC
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 286 - 291