Abstract
Identity-based key agreement protocol affords a natural way to combine the participant’s identity with its public key. However, most of them just consider the key agreement in a single private key generator (PKG) environment. In addition, the existing key agreement protocols have a great computing overhead for mobile computing which is more and more popular today. This paper proposes a new identity based key agreement protocol. With the help of mathematical tools, we make our protocol applied in multiple PKG environment. It also satisfies all the security properties which is set for key agreement protocol. Moreover, some of its time-consuming operations can be delivered to untrusted public computation resources, so its computing complexity can be greatly reduced.
Similar content being viewed by others
References
Shamir A. Identity based cryptosystems and signature schemes[C]// Advances in Cryptology Crypto84. Berlin: Springer-Verlag, 1984: 47–53.
Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]// Advances in Cryptology Crypto2001. Berlin: Springer-Verlag, 2001: 213–229.
Shim K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing[J]. Electron Lett, 2003, 39(8): 653–654.
Smart N P. Identity based authenticated key agreement protocol based on the Weil pairing[J]. Electronics Letters, 2002, 38(13): 630–632.
Choie Y, Jeong E. Efficient identity-based authenticated key agreement protocol from pairings[J]. Applied Mathematics and Computation, 2005, 162(1): 179–188.
Ryu E, Yoon E, Yoo K. An efficient ID-based authenticated key agreement protocol from pairings[C]// Networking 2004. Berlin: Springer-Verlag, 2004: 1458–1463.
Yuan Q, Li S. A new efficient ID-based authenticated key agreement protocol[EB/OL]. [2014-03-14]. http://eprint.iacr.org/2005/309.pdf.
Chen L, Kudla C. Identity based authenticated key agreement protocols from pairings[C]// IEEE Computer Security Foundations Workshop. Pacific Grove: IEEE Press, 2003: 219–233.
Lee H, Kim D, Kim S, et al. Identity-based key agreement protocols in a multiple PKG environment[C]// International Conference on Computational Science and Its Applications. Berlin: Springer-Verlag, 2005: 877–886.
Kunz-Jacques S, Pointcheval D. A new key exchange protocol based on MQV assuming public computations[C]// Security and Cryptography for Networks. Berlin: Springer-Verlag, 2006: 186–200.
Yao A C, Zhao Y. A new family of implicitly authenticated diffie-hellman protocols[EB/OL].[2014-03-05].http://eprint.iacr.org/.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China(61103194)
Biography: ZHOU Huan, male, Master candidate, research direction: network communications and information security.
Rights and permissions
About this article
Cite this article
Zhou, H., Wang, X. & Su, J. An efficient identity-based key agreement protocol in a multiple PKG environment. Wuhan Univ. J. Nat. Sci. 19, 455–460 (2014). https://doi.org/10.1007/s11859-014-1039-8
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-014-1039-8