Abstract
Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receiver is required. In asymmetric cryptosytems, so far, only a few ID-based key agreement protocols are one-way and most of them can only provide authentication for only one entity to the other. In this paper, two ID-based one-way key agreement protocols are proposed. The advantage of our protocols is that the authentication of the sender and receiver is established at the same time although the key distribution is only one pass. In addition, transmitted data size in our schemes is very small and the parameter for key agreement consists of just one. In this paper, an additional security attribute for key agreement protocols is defined and the rigorous security of our protocols is estimated. The performance evaluation is also analyzed by comparing our schemes with the previous schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997)
Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)
Gentry, C., Silvergerg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)
Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)
Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptogr. 28(2), 119–134 (2003)
McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement, Cryptology ePrint Archive, Report 2004/122, available at http://eprint.iacr.org/2004/122/
Menezes, A., Qu, M., Vanstone, S.: Some new key agreement protocols providing mutual implicit authentication. In: Proceedings of Selected Areas in Cryptography– SAC 1995, pp. 22–32 (1995)
Malone-lee, J.: Identity-based signcryption, Cryptology ePrint Archive, Report 2002/098, available at http://eprint.iacr.org/2002/098/
Nalla, D., Reddy, K.C.: Signcryption scheme for identity-based cryptosystems, Cryptology ePrint Archive, Report 2003/066, available at http://eprint.iacr.org/2003/066/
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett. 38, 630–632 (2002), Cryptology ePrint Archive, Report 2001/111, available at http://eprint.iacr.org/2001/111/
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symp. on Cryptography and Information Security, Okinawa, Japan, January 2000, pp. 26–28 (2000)
Terada, R., Benis Jr., W.D., Okamoto, E.: An IBE scheme to exchange authenticated secre keys. In: Symp. on Cryptography and Information Security, Sendai, Japan, pp. 27–30, 1529-1533 (January 2004)
Okamot, T., Harada, K., Okamoto, E.: ID-based agreement protocols using pairing. In: Symp. on Information Theory and Its Application–ISITA 2004, Parma, Italy (October 2004)
Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) < < cost(signature)+ cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)
Zhang, F., Liu, S., Kim, K.: ID-based one round authenticated tripartite key agreement protocol with pairings, Cryptology ePrint Archive, Report 2002/122, available at http://eprint.iacr.org/2002/122/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Okamoto, T., Tso, R., Okamoto, E. (2005). One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2005. Lecture Notes in Computer Science(), vol 3558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11526018_13
Download citation
DOI: https://doi.org/10.1007/11526018_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-27871-9
Online ISBN: 978-3-540-31883-5
eBook Packages: Computer ScienceComputer Science (R0)