Advanced Search
Volume 31 Issue 8
Dec.  2010
Turn off MathJax
Article Contents
Ren Yong-jun, Wang Jian-dong, Zhuang Yi. Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Electronics & Information Technology, 2009, 31(8): 1990-1995. doi: 10.3724/SP.J.1146.2008.01202
Citation: Ren Yong-jun, Wang Jian-dong, Zhuang Yi. Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model[J]. Journal of Electronics & Information Technology, 2009, 31(8): 1990-1995. doi: 10.3724/SP.J.1146.2008.01202

Enhanced Identity-Based Authenticated Key Agreement Protocols in the Standard Model

doi: 10.3724/SP.J.1146.2008.01202
  • Received Date: 2008-09-22
  • Rev Recd Date: 2009-03-10
  • Publish Date: 2009-08-19
  • Key derivation is an essential part of key agreement protocol. In 2007, Wang et al. presented an identity-based authenticated key agreement protocol in standard model. However there exists serious fault in key derivation of the protocol. In this paper, key derivation phase in standard model is subdivided into randomness extraction and key derivation. And a new authenticated key agreement protocol is devised using identity-based encryption scheme introduced by Kiltz et al, which has a tightly security reduction and performance efficiency.
  • loading
  • Wang Sheng-bao, Cao Zhen-fu, and Dong Xiao-lei. Provablysecure identity-based authenticated key agreement protocolsin the standard model[J]. Chinese Journal of Computers,2007, 30(10): 1842-1852.[2]Smart N. An ID-based authenticated key agreement protocolbased on the Weil pairing[J].Electronic Letters.2002, 38(13):630-632[3]Jin Li-jie and Xu Chun-xiang. An identity basedauthenticated key agreement protocol[J]. InformationSecurity and Communications Privacy, 2007, 16(8): 20-22.[4]Wang Li-min and Li Yi-fa. Research of identity-based keyagreement protocols[J]. Application Research of Computers,2007, 24(9): 93-95.[5]Sun Ji-min, Sun Yu, Zhang Si-dong, and Pei Qing-qi.Identity(ID)-based authentication and the key agreementprotocol[J]. Journal of Xidian University, 2008, 35(3):559-562.[6]Cao Tian-jie and Lei Hong. Privacy-enhancing authenticatedkey agreement protocols based on elliptic curvecryptosystem[J]. Acta Electronica Sinica, 2008, 36(2):397-401.[7]Chen L, Cheng Z, and Smart N P. Identity-based keyagreement protocols from pairings[J].International Journalof Information Security.2007, 6(4):213-241[8]Chevassut O, Fouque P A, Gaudry P, and Pointcheval D. Keyderivation and randomness extraction.Cryptology ePrintArchive, Report 2005/061.[9]Gentry C. Practical identity-based encryption withoutrandom oracles[C][J].In Proceedings of EURO-CRYPT0.2006, LNCS 4004:445-464[10]Eike Kiltz and Yevgeniy Vahlis. CCA2 Secure IBE: StandardModel Efficiency through Authenticated SymmetricEncryption[C][J].In Proceedings of CT-RSA0.2008, LNCS4964:221-239[11]Krawczyk H. HMQV: A high-performance secure diffiehellmanprotocol[C][J].Advances in Cryptology- CRYPTO0.2005, LNCS 3621:546-566[12]Bellare M and Rogaway P. Entity authentication and keydistribution[C][J].In Proceedings of CRYPTO9.1994, LNCS773:110-125[13]Canetti R and Krawczyk H. Analysis of key-exchangeprotocols and their use for building secure channels. InAdvances in Cryptology-EUROCRYPT 2001 Proceeding,Berlin: Springer-Verlag, 2001: 453-474.[14]Choo K K, Boyd C, and Hitchcock Y. Examiningindistinguishability-based proof models for key establishmentprotocols. Advances in Cryptology ASIACRYPT 2005, 2005,LNCS 3788: 585-604.[15]Dent A W. A note on game-hopping proofs. CryptologyePrint Archive, Report 2006/260.[16]Park DongGook , Boyd Colin, and Moon Sang-Jae. Forwardsecrecy and its application to future mobile communicationssecurity[C][J].In Proceedings of PKC200.2000, LNCS 1751:433-445
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3669) PDF downloads(914) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return