Skip to main content

Security of Two-Party Identity-Based Key Agreement

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNSC,volume 3715)

Abstract

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.

Keywords

  • Elliptic Curve
  • Security Proof
  • Forward Secrecy
  • Cryptology ePrint Archive
  • Corrupt Query

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barreto, P.S.L.M., Galbraith, S., Eigeartaigh, C.O., Scott, M.: Efficient pairing computation on supersingular abelian varieties. Cryptology ePrint Archive, Report 2004/375 (2004), http://eprint.iacr.org/2004/375/

  2. Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  3. Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110–125. Springer, Heidelberg (1994)

    Google Scholar 

  4. Bellare, M., Rogaway, P.: Provably Secure Session Key Distribution: The Three Party Case. In: 27th ACM Symposium on the Theory of Computing - STOC 1995, pp. 57–66. ACM Press, New York (1995)

    CrossRef  Google Scholar 

  5. Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)

    CrossRef  Google Scholar 

  6. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM Journal of Computing 32(3), 585–615 (2003)

    CrossRef  MathSciNet  Google Scholar 

  7. Boyd, C., Mao, W., Paterson, K.: Key Agreement using Statically Keyed Authenticators. In: Jakobsson, M., Yung, M., Zhou, J. (eds.) ACNS 2004. LNCS, vol. 3089, pp. 248–262. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  8. Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)

    CrossRef  Google Scholar 

  9. Chen, L., Kudla, C.: Identity Based Authenticated Key Agreement Protocols from Pairings. In: 16th IEEE Computer Security Foundations Workshop - CSFW 2003, pp. 219–233. IEEE Computer Society Press, Los Alamitos (2003), Corrected version at http://eprint.iacr.org/2002/184/

    CrossRef  Google Scholar 

  10. Cheng, Z., Chen, L.: On Security Proof of McCullagh-Barreto’s Key Agreement Protocol and its Variants. Cryptology ePrint Archive, Report 2005/201 (2005), http://eprint.iacr.org/2005/201/

  11. Choi, K.Y., Hwang, J.Y., Lee, D.H., Seo, I.S.: ID-based Authenticated Key Agreement for Low-Power Mobile Devices. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 494–505. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  12. Choie, Y.J., Jeong, E., Lee, E.: Efficient Identity-based Authenticated Key Agreement Protocol from Pairings. Journal of Applied Mathematics and Computation, 179–188 (2005)

    Google Scholar 

  13. Choo, K.-K.R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably Secure Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 116–131. Springer, Heidelberg (2005), Extended version available from http://eprint.iacr.org/2005/206

    CrossRef  Google Scholar 

  14. Dupont, R., Enge, A.: Practical Non-Interactive Key Distribution Based on Pairings. Cryptology ePrint Archive, Report 2002/136 (2002), http://eprint.iacr.org/2002/136/

  15. Galbraith, S.D., Harrison, K., Soldera, D.: Implementing the Tate pairing. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 324–337. Springer, Heidelberg (2002)

    CrossRef  Google Scholar 

  16. Janson, P., Tsudik, G.: Secure and Minimal Protocols for Authenticated Key Distribution. Computer Communications, 645–653 (1995)

    Google Scholar 

  17. Kim, K.-W., Ryu, E.-K., Yoo, K.-Y.: ID-Based Authenticated Multiple-Key Agreement Protocol from Pairings. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 672–680. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  18. Kim, S., Mambo, M., Okamoto, T., Shizuya, H., Tada, M., Won, D.: On the Security of the Okamoto-Tanaka ID-based Key Exchange Scheme against Active Attacks. IEICE Transactions Fundamentals 84(1), 231–238 (2001), http://search.ieice.or.jp/2001/files/e000a01.htm#e84-a,1,231

    Google Scholar 

  19. Krawczyk, H.: HMQV: A High-Performance Secure Diffie-Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546–566. Springer, Heidelberg (2005), Extended version available from http://eprint.iacr.org/2005/176/

    Google Scholar 

  20. Lee, H., Kim, D., Kim, S., Oh, H.: Identity-based Key Agreement Protocols in a Multiple PKG Environment. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3483, pp. 877–886. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  21. Lim, C.H., Lee, P.J.: A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 249–263. Springer, Heidelberg (1997)

    Google Scholar 

  22. Mambo, M., Shizuya, H.: A Note on the Complexity of Breaking Okamoto-Tanaka ID-based Key Exchange Scheme. IEICE Transactions Fundamentals E82-A(1), 77–80 (1999)

    Google Scholar 

  23. McCullagh, N., Barreto, P.S.L.M.: A New Two-Party Identity-Based Authenticated Key Agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005), Extended version available from http://eprint.iacr.org/2004/122/

    CrossRef  Google Scholar 

  24. Okamoto, E.: Key Distribution Systems Based on Identification Information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194–202. Springer, Heidelberg (1988)

    Google Scholar 

  25. Okamoto, E., Tanaka, K.: Key Distribution System Based on Identification Information. IEEE Journal on Selected Areas in Communications 7(4), 481–485 (1989)

    CrossRef  Google Scholar 

  26. Okamoto, T., Tso, R., Okamoto, E.: One-Way and Two-Party ID-based Key Agreement Protocols using Pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds.) MDAI 2005. LNCS (LNAI), vol. 3558, pp. 122–133. Springer, Heidelberg (2005)

    CrossRef  Google Scholar 

  27. Ryu, E.-K., Yoon, E.-J., Yoo, K.-Y.: An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings. In: Mitrou, N.M., Kontovasilis, K., Rouskas, G.N., Iliadis, I., Merakos, L. (eds.) NETWORKING 2004. LNCS, vol. 3042, pp. 1464–1469. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  28. Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve. Cryptology ePrint Archive, Report 2003/054 (2003), http://eprint.iacr.org/2003/054/

  29. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems Based on Pairing. In: The 2000 Sympoium on Cryptography and Information Security - SCIS 2000 (2000)

    Google Scholar 

  30. Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    CrossRef  Google Scholar 

  31. Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol based on Weil Pairing. IEE Electronics Letters 39(8), 653–654 (2002)

    CrossRef  Google Scholar 

  32. Smart, N.: An Identity based Authenticated Key Agreement Protocol based on the Weil Pairing. Electronics Letters, 630–632 (2002)

    Google Scholar 

  33. Sun, H.-M., Hsieh, B.-T.: Security Analysis of Shim’s Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2003/113 (2003), http://eprint.iacr.org/2003/113

  34. Wang, Y.: Efficient Identity-Based and Authenticated Key Agreement Protocol. Cryptology ePrint Archive, Report 2005/108 (2005), http://eprint.iacr.org/2005/108/

  35. Xie, G.: An ID-Based Key Agreement Scheme from Pairing. Cryptology ePrint Archive, Report 2005/093 (2005), http://eprint.iacr.org/2005/093/

  36. Yi, X.: An Identity-Based Signature Scheme from the Weil Pairing. IEEE Communications Letters 7(2), 76–78 (2003)

    CrossRef  Google Scholar 

  37. Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boyd, C., Choo, KK.R. (2005). Security of Two-Party Identity-Based Key Agreement. In: Dawson, E., Vaudenay, S. (eds) Progress in Cryptology – Mycrypt 2005. Mycrypt 2005. Lecture Notes in Computer Science, vol 3715. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11554868_17

Download citation

  • DOI: https://doi.org/10.1007/11554868_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28938-8

  • Online ISBN: 978-3-540-32066-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics