Skip to main content

Strongly-Secure Identity-Based Key Agreement and Anonymous Extension

  • Conference paper
Information Security (ISC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4779))

Included in the following conference series:

Abstract

We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle model, only a weak adversarial model is considered – the adversary is not allowed to ask Session-Key Reveal queries that will allow the adversary to learn previously established session keys. Recent research efforts devoted to providing a stronger level of security require strong assumptions, such as assuming that the simulator has access to a non-existential computational or decisional oracle. In this work, we propose an ID-based key agreement protocol and prove its security in the widely accepted indistinguishability-based model of Canetti and Krawczyk. In our proof, the simulator does not require access to any non-existential computational or decisional oracle. We then extend our basic protocol to support ad-hoc anonymous key agreement with bilateral privacy. To the best of our knowledge, this is the first protocol of its kind as previously published protocols are for fixed group and provide only unilateral privacy (i.e., only one of the protocol participants enjoy anonymity).

The full version is available at IACR Cryptology ePrint Archive [19].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: Untraceable Mobility or How to Travel Incognito. Computer Networks 31(8), 871–884 (1999)

    Article  Google Scholar 

  2. Bellare, M., Palacio, A.: The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 273–289. Springer, Heidelberg (2004)

    Google Scholar 

  3. Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 110–125. Springer, Heidelberg (1994)

    Google Scholar 

  4. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal on Computing 32(3), 585–615 (2003)

    Article  MathSciNet  Google Scholar 

  5. Boyd, C., Choo, K.-K.R.: Security of Two-Party Identity-Based Key Agreement. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 229–243. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  6. Boyd, C., Mao, W., Paterson, K.: Deniable Authenticated Key Establishment for Internet Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 3364, pp. 255–271. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Boyd, C., Park, D.: Public Key Protocols for Wireless Communications. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 47–57. Springer, Heidelberg (2000), available from http://sky.fit.qut.edu.au/~boydc/papers/icisc98.ps.gz

    Google Scholar 

  8. Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001), extended version available from http://eprint.iacr.org/2001/040

    Chapter  Google Scholar 

  9. Chen, L., Kudla, C.: Identity Based Authenticated Key Agreement Protocols from Pairings. In: CSFW 2003, pp. 219–233. IEEE Computer Society Press, Los Alamitos (2003), Corrected version at http://eprint.iacr.org/2002/184

    Google Scholar 

  10. Cheng, Z., Chen, L.: On Security Proof of McCullagh-Barreto’s Key Agreement Protocol and its Variants. Cryptology ePrint Archive, Report 2005/201 (2005)

    Google Scholar 

  11. Cheng, Z., Chen, L., Comley, R., Tang, Q.: Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 202–213. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. Cryptology ePrint Archive, Report 2005/129 (2005)

    Google Scholar 

  13. Choie, Y.J., Jeong, E., Lee, E.: Efficient Identity-based Authenticated Key Agreement Protocol from Pairings. Applied Mathematics and Computation 162(1), 179–188 (2005)

    Article  MATH  MathSciNet  Google Scholar 

  14. Choo, K.-K.R.: Key Establishment: Proofs and Refutations. Ph.D. Thesis, Queensland University of Technology (2006), http://adt.library.qut.edu.au/adt-qut/public/adt-QUT20060928.114022/

  15. Choo, K.-K.R.: A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model. The Computer Journal (2007), pre-print version available from http://eprint.iacr.org/2007/188

  16. Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability-Based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585–604. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  17. Choo, K.-K.R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably Secure Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 116–131. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Chow, S.S.M.: Personal Communication with Authors of [17] (April 29, 2005)

    Google Scholar 

  19. Chow, S.S.M., Choo, K.-K.R.: Strongly-Secure Identity-based Key Agreement and Anonymous Extension. Cryptology ePrint Archive, Report 2007/018. Full version of this paper (2007)

    Google Scholar 

  20. Chow, S.S.M., Yiu, S.M., Hui, L.C.K.: Efficient Identity Based Ring Signature. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 499–512. Springer, Heidelberg (2005)

    Google Scholar 

  21. Chow, S.S.M., Yiu, S.M., Hui, L.C.K., Chow, K.P.: Efficient Forward and Provably Secure ID-Based Signcryption Scheme. In: Lim, J.-I., Lee, D.-H. (eds.) ICISC 2003. LNCS, vol. 2971, pp. 352–369. Springer, Heidelberg (2004)

    Google Scholar 

  22. Krawczyk, H.: HMQV: A High-Performance Secure Diffie–Hellman Protocol. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 546–566. Springer, Heidelberg (2005)

    Google Scholar 

  23. Kudla, C., Paterson, K.G.: Modular Security Proofs for Key Agreement Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549–569. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  24. Kunz-Jacques, S., Pointcheval, D.: About the Security of MTI/C0 and MQV. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 156–172. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  25. McCullagh, N., Barreto, P.S.L.M.: A New Two-Party Identity-Based Authenticated Key Agreement. In: Menezes, A.J. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005)

    Google Scholar 

  26. Samfat, D., Molva, R., Asokan, N.: Untraceability in Mobile Networks. In: ACM MobiCom 1995, pp. 26–36. ACM Press, New York (1995)

    Chapter  Google Scholar 

  27. Shim, K.-A.: Efficient ID-based Authenticated Key Agreement Protocol based on Weil Pairing. IEE Electronics Letters 39(8), 653–654 (2002)

    Article  Google Scholar 

  28. Shim, K.-A.: Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2005/357 (2005)

    Google Scholar 

  29. Shoup, V.: On Formal Models for Secure Key Exchange (Version 4). Technical Report RZ 3120 (#93166), IBM Research, Zurich (1999)

    Google Scholar 

  30. Smart, N.: An Identity based Authenticated Key Agreement Protocol based on the Weil Pairing. IEE Electronics Letters 38(13), 630–632 (2002)

    Article  Google Scholar 

  31. Sun, H.-M., Hsieh, B.-T.: Security Analysis of Shim’s Authenticated Key Agreement Protocols from Pairings. Cryptology ePrint Archive, Report 2003/113 (2003)

    Google Scholar 

  32. Wang, Y.: Efficient Identity-Based and Authenticated Key Agreement Protocol. Cryptology ePrint Archive, Report 2005/108 (2005)

    Google Scholar 

  33. Xie, G.: An ID-Based Key Agreement Scheme from Pairing. Cryptology ePrint Archive, Report 2005/093 (2005)

    Google Scholar 

  34. Yi, X.: Efficient ID-Based Key Agreement from Weil Pairing. IEEE Electronics Letters 39(2), 206–208 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Juan A. Garay Arjen K. Lenstra Masahiro Mambo René Peralta

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chow, S.S.M., Choo, KK.R. (2007). Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds) Information Security. ISC 2007. Lecture Notes in Computer Science, vol 4779. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75496-1_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75496-1_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75495-4

  • Online ISBN: 978-3-540-75496-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics