Cao Chen-Lei, Liu Ming-Qi, Zhang Ru, Yang Yi-Xian. Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity[J]. Journal of Electronics & Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684
Citation:
Cao Chen-Lei, Liu Ming-Qi, Zhang Ru, Yang Yi-Xian. Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity[J]. Journal of Electronics & Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684
Cao Chen-Lei, Liu Ming-Qi, Zhang Ru, Yang Yi-Xian. Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity[J]. Journal of Electronics & Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684
Citation:
Cao Chen-Lei, Liu Ming-Qi, Zhang Ru, Yang Yi-Xian. Provably Secure Authenticated Key Agreement Protocol Based on Hierarchical Identity[J]. Journal of Electronics & Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684
At present most Identity-based authenticated key agreement protocols are built on the security infrastructure in which a single Private Key Generator (PKG) is contained as the only trusted third party of the whole system, however such kind of infrastructure can not satisfy the requirements of hierarchical identity register and authentication. On the basis of Hierarchical Identity Based Encryption (HIBE) system, this paper reconstructs the private key and proposes a new hierarchical identity based authenticated key agreement protocol using the bilinear map in multiplicative cyclic group and it provides secure session key exchange mechanism for cloud entities on different hierarchical levels. Based on the Computational Diffie-Hellman (CDH) and Gap Diffie-Hellman (GDH) assumptions, this paper proves that the new protocol not only achieves known-key security, forward secrecy and PKG forward secrecy, but also resists key-compromise impersonation attacks in the eCK model.