Advertisement

Wuhan University Journal of Natural Sciences

, Volume 12, Issue 1, pp 63–66 | Cite as

Escrow-free certificate-based authenticated key agreement protocol from pairings

  • Wang Shengbao 
  • Cao Zhenfu 
Article

Abstract

Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart’s protocol.

Key words

authenticated key agreement (AK) certificate-based encryption (CBE) pairings session key escrow perfect forward security 

CLC number

TP 310 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Law L, Menezes A J, Qu M, et al. An Efficient Protocol for Authenticated Key Agreement[J]. Des Codes Cryptogr, 2003, 28(2): 119–134.CrossRefGoogle Scholar
  2. [2]
    Blake W S, Menezes A. Authenticated Diffie-Hellman Key Agreement Protocols[C]//Proc of SAC’98, LNCS 1556. Berlin: Springer-Verlag, 1999: 339–361.Google Scholar
  3. [3]
    Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. New York: CRC Press, 1997: 237–238.Google Scholar
  4. [4]
    Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans Inf Theory, 1976, 22(6): 644–654.CrossRefGoogle Scholar
  5. [5]
    Smart N P. An ID-Based Authenticated Key Agreement Protocol Based on the Weil Pairing[J]. Electron Lett, 2002, 38(13): 630–632.CrossRefGoogle Scholar
  6. [6]
    Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[C]//Proc of CRYPTO 2001, LNCS 2139. Berlin: Springer-Verlag, 2001: 213–229.Google Scholar
  7. [7]
    Gentry C. Certificate-Based Encryption and the Certificate Revocation Problem[C]//Proc of EUROCRYPT 2003, LNCS 2656. Berlin: Springer-Verlag, 2003: 272–293.Google Scholar
  8. [8]
    Shim K. Efficient ID-Based Authenticated Key Agreement Protocol Based on Weil Pairing[J]. Electron Lett, 2003, 39(8): 653–654.CrossRefGoogle Scholar
  9. [9]
    Ryu E K, Yoon E J, Yoo, K Y. An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings[C]//Proc of Networking 2004, LNCS 3042. Berlin: Springer-Verlag, 2004: 1458–1463.Google Scholar
  10. [10]
    Chen L, Kudla C. Identity Based Key Agreement Protocols from Pairings[C]//Proc of the 16th IEEE Computer Security Foundations Workshop. Asilomar, CA: IEEE Computer Society, 2002: 219–223.Google Scholar

Copyright information

© Wuhan University Journals Press 2007

Authors and Affiliations

  1. 1.School of Electronic, Information and Electrical EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations