Skip to main content

Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8209))

Abstract

Ever since Shamir introduced identity based cryptography in 1984, there has been a tremendous interest in designing efficient key agreement protocols in this paradigm. Since pairing is a costly operation and the composite order groups must be very large to ensure security, we focus on pairing free protocols in prime order groups. We propose a new protocol that is pairing free, working in prime order group and having tight reduction to Strong Diffie Hellman (SDH) problem under the CK model. Thus, the first major advantage is that smaller key sizes are sufficient to achieve comparable security. Our scheme has several other advantages. The major one being the capability to handle active adversaries. All the previous protocols can offer security only under passive adversaries. Our protocol recognizes the corruption by an active adversary and aborts the process. Achieving this in single round is significantly challenging. Ours is the first scheme achieving this property. In addition to this significant property, our scheme satisfies other security properties that are not covered by CK model such as forward secrecy, resistance to reflection, key compromise impersonation attacks and ephemeral key compromise impersonation attacks.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abe, M., Kiltz, E., Okamoto, T.: Compact cca-secure encryption for messages of arbitrary length. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 377–392. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  2. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 180(15), 2895–2903 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  4. Cheng, Q., Ma, C.: Ephemeral key compromise attack on the ib-ka protocol. IACR Cryptology ePrint Archive 2009, 568 (2009)

    Google Scholar 

  5. Fiore, D., Gennaro, R.: Making the diffie-hellman protocol identity-based. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 165–178. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Goh, E.-J., Jarecki, S.: A signature scheme as secure as the diffie-hellman problem. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 401–415. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Günther, C.G.: An identity-based key-exchange protocol. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 29–37. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  8. Hafizul Islam, S.K., Biswas, G.P.: An improved pairing-free identity-based authenticated key agreement protocol based on {ECC}. Procedia Engineering 30, 499–507 (2012)

    Article  Google Scholar 

  9. Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. Journal of Cryptology 20(1), 85–113 (2007)

    Article  MathSciNet  MATH  Google Scholar 

  10. Krawczyk, H.: HMQV: A high-performance secure diffie-hellman protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546–566. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Maurer, U.M., Wolf, S.: Diffie-hellman oracles. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 268–282. Springer, Heidelberg (1996)

    Google Scholar 

  12. Menezes, A., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography, ch. 14, pp. 617–618. CRC Press (1996)

    Google Scholar 

  13. Okamoto, T., Pointcheval, D.: The gap-problems: A new class of problems for the security of cryptographic schemes. In: Kim, K.-C. (ed.) PKC 2001. LNCS, vol. 1992, pp. 104–118. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  14. Saeednia, S.: Improvement of gunther’s identity-based key exchange protocol. Electronics Letters 36(18), 1535–1536 (2000)

    Article  Google Scholar 

  15. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sree Vivek, S., Sharmila Deva Selvi, S., Renganathan Venkatesan, L., Pandu Rangan, C. (2013). Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round. In: Susilo, W., Reyhanitabar, R. (eds) Provable Security. ProvSec 2013. Lecture Notes in Computer Science, vol 8209. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41227-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-41227-1_3

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-41226-4

  • Online ISBN: 978-3-642-41227-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics