An efficient identity-based key agreement protocol in a multiple PKG environment
- 85 Downloads
Abstract
Identity-based key agreement protocol affords a natural way to combine the participant’s identity with its public key. However, most of them just consider the key agreement in a single private key generator (PKG) environment. In addition, the existing key agreement protocols have a great computing overhead for mobile computing which is more and more popular today. This paper proposes a new identity based key agreement protocol. With the help of mathematical tools, we make our protocol applied in multiple PKG environment. It also satisfies all the security properties which is set for key agreement protocol. Moreover, some of its time-consuming operations can be delivered to untrusted public computation resources, so its computing complexity can be greatly reduced.
Key words
key agreement identity based public computation multiple PKG environmentCLC number
TP 309Preview
Unable to display preview. Download preview PDF.
References
- [1]Shamir A. Identity based cryptosystems and signature schemes[C]// Advances in Cryptology Crypto84. Berlin: Springer-Verlag, 1984: 47–53.Google Scholar
- [2]Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]// Advances in Cryptology Crypto2001. Berlin: Springer-Verlag, 2001: 213–229.Google Scholar
- [3]Shim K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing[J]. Electron Lett, 2003, 39(8): 653–654.CrossRefGoogle Scholar
- [4]Smart N P. Identity based authenticated key agreement protocol based on the Weil pairing[J]. Electronics Letters, 2002, 38(13): 630–632.CrossRefGoogle Scholar
- [5]Choie Y, Jeong E. Efficient identity-based authenticated key agreement protocol from pairings[J]. Applied Mathematics and Computation, 2005, 162(1): 179–188.CrossRefGoogle Scholar
- [6]Ryu E, Yoon E, Yoo K. An efficient ID-based authenticated key agreement protocol from pairings[C]// Networking 2004. Berlin: Springer-Verlag, 2004: 1458–1463.Google Scholar
- [7]Yuan Q, Li S. A new efficient ID-based authenticated key agreement protocol[EB/OL]. [2014-03-14]. http://eprint.iacr.org/2005/309.pdf.
- [8]Chen L, Kudla C. Identity based authenticated key agreement protocols from pairings[C]// IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE Press, 2003: 219–233.Google Scholar
- [9]Lee H, Kim D, Kim S, et al. Identity-based key agreement protocols in a multiple PKG environment[C]// International Conference on Computational Science and Its Applications. Berlin: Springer-Verlag, 2005: 877–886.Google Scholar
- [10]Kunz-Jacques S, Pointcheval D. A new key exchange protocol based on MQV assuming public computations[C]// Security and Cryptography for Networks. Berlin: Springer-Verlag, 2006: 186–200.CrossRefGoogle Scholar
- [11]Yao A C, Zhao Y. A new family of implicitly authenticated diffie-hellman protocols[EB/OL].[2014-03-05].http://eprint.iacr.org/.