Abstract
We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle model, only a weak adversarial model is considered – the adversary is not allowed to ask Session-Key Reveal queries that will allow the adversary to learn previously established session keys. Recent research efforts devoted to providing a stronger level of security require strong assumptions, such as assuming that the simulator has access to a non-existential computational or decisional oracle. In this work, we propose an ID-based key agreement protocol and prove its security in the widely accepted indistinguishability-based model of Canetti and Krawczyk. In our proof, the simulator does not require access to any non-existential computational or decisional oracle. We then extend our basic protocol to support ad-hoc anonymous key agreement with bilateral privacy. To the best of our knowledge, this is the first protocol of its kind as previously published protocols are for fixed group and provide only unilateral privacy (i.e., only one of the protocol participants enjoy anonymity).
The full version is available at IACR Cryptology ePrint Archive [19].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: Untraceable Mobility or How to Travel Incognito. Computer Networks 31(8), 871–884 (1999)
Bellare, M., Palacio, A.: The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273–289. Springer, Heidelberg (2004)
Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110–125. Springer, Heidelberg (1994)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 585–615 (2003)
Boyd, C., Choo, K.-K.R.: Security of Two-Party Identity-Based Key Agreement. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 229–243. Springer, Heidelberg (2005)
Boyd, C., Mao, W., Paterson, K.: Deniable Authenticated Key Establishment for Internet Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 3364, pp. 255–271. Springer, Heidelberg (2005)
Boyd, C., Park, D.: Public Key Protocols for Wireless Communications. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 47–57. Springer, Heidelberg (2000), available from http://sky.fit.qut.edu.au/~boydc/papers/icisc98.ps.gz
Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001), extended version available from http://eprint.iacr.org/2001/040
Chen, L., Kudla, C.: Identity Based Authenticated Key Agreement Protocols from Pairings. In: CSFW 2003, pp. 219–233. IEEE Computer Society Press, Los Alamitos (2003), Corrected version at http://eprint.iacr.org/2002/184
Cheng, Z., Chen, L.: On Security Proof of McCullagh-Barreto’s Key Agreement Protocol and its Variants. Cryptology ePrint Archive, Report 2005/201 (2005)
Cheng, Z., Chen, L., Comley, R., Tang, Q.: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 202–213. Springer, Heidelberg (2006)
Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. Cryptology ePrint Archive, Report 2005/129 (2005)
Choie, Y.J., Jeong, E., Lee, E.: Efficient Identity-based Authenticated Key Agreement Protocol from Pairings. Applied Mathematics and Computation 162(1), 179–188 (2005)
Choo, K.-K.R.: Key Establishment: Proofs and Refutations. Ph.D. Thesis, Queensland University of Technology (2006), http://adt.library.qut.edu.au/adt-qut/public/adt-QUT20060928.114022/
Choo, K.-K.R.: A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal (2007), pre-print version available from http://eprint.iacr.org/2007/188
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585–604. Springer, Heidelberg (2005)
Choo, K.-K.R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably Secure Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 116–131. Springer, Heidelberg (2005)
Chow, S.S.M.: Personal Communication with Authors of [17] (April 29, 2005)
Chow, S.S.M., Choo, K.-K.R.: Strongly-Secure Identity-based Key Agreement and Anonymous Extension. Cryptology ePrint Archive, Report 2007/018. Full version of this paper (2007)
Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient Identity Based Ring Signature. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 499–512. Springer, Heidelberg (2005)
Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)
Krawczyk, H.: HMQV: A High-Performance Secure Diffie–Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546–566. Springer, Heidelberg (2005)
Kudla, C., Paterson, K.G.: Modular Security Proofs for Key Agreement Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549–569. Springer, Heidelberg (2005)
Kunz-Jacques, S., Pointcheval, D.: About the Security of MTI/C0 and MQV. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 156–172. Springer, Heidelberg (2006)
McCullagh, N., Barreto, P.S.L.M.: A New Two-Party Identity-Based Authenticated Key Agreement. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005)
Samfat, D., Molva, R., Asokan, N.: Untraceability in Mobile Networks. In: ACM MobiCom 1995, pp. 26–36. ACM Press, New York (1995)
Shim, K.-A.: Efficient ID-based Authenticated Key Agreement Protocol based on Weil Pairing. IEE Electronics Letters 39(8), 653–654 (2002)
Shim, K.-A.: Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2005/357 (2005)
Shoup, V.: On Formal Models for Secure Key Exchange (Version 4). Technical Report RZ 3120 (#93166), IBM Research, Zurich (1999)
Smart, N.: An Identity based Authenticated Key Agreement Protocol based on the Weil Pairing. IEE Electronics Letters 38(13), 630–632 (2002)
Sun, H.-M., Hsieh, B.-T.: Security Analysis of Shim’s Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2003/113 (2003)
Wang, Y.: Efficient Identity-Based and Authenticated Key Agreement Protocol. Cryptology ePrint Archive, Report 2005/108 (2005)
Xie, G.: An ID-Based Key Agreement Scheme from Pairing. Cryptology ePrint Archive, Report 2005/093 (2005)
Yi, X.: Efficient ID-Based Key Agreement from Weil Pairing. IEEE Electronics Letters 39(2), 206–208 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chow, S.S.M., Choo, KK.R. (2007). Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds) Information Security. ISC 2007. Lecture Notes in Computer Science, vol 4779. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75496-1_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-75496-1_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75495-4
Online ISBN: 978-3-540-75496-1
eBook Packages: Computer ScienceComputer Science (R0)