Chapter

Information Security Practice and Experience

Volume 3903 of the series Lecture Notes in Computer Science pp 202-213

Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings

  • Zhaohui ChengAffiliated withLancaster UniversitySchool of Computing Science, Middlesex University
  • , Liqun ChenAffiliated withCarnegie Mellon UniversityHewlett-Packard Laboratories
  • , Richard ComleyAffiliated withLancaster UniversitySchool of Computing Science, Middlesex University
  • , Qiang TangAffiliated withCarnegie Mellon UniversityInformation Security Group, Royal Holloway, University of London

* Final gross prices may vary according to local VAT.

Get Access

Abstract

In most of the existing identity-based key agreement schemes, it is usually assumed that either the communicated parties know each other’s identifier before the protocol starts or their identifiers are transferred along with the protocol messages. However, these schemes are not suitable for use in many real-world applications aimed to achieve unilateral identity privacy, which means that one communicating party does not want to expose his identifier to an outsider while his partner cannot know his identifier in advance. In this paper, we propose an efficient identity-based two-party key agreement scheme with unilateral identity privacy using pairing, and formally analyze its security in a modified Bellare- Rogaway key agreement security model.