Skip to main content

One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing

  • Conference paper
Modeling Decisions for Artificial Intelligence (MDAI 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3558))

Abstract

Cryptography is the ancient science of encrypting messages so that only the sender and receiver can recover them. To achieve this goal, an agreed key between the sender and receiver is required. In asymmetric cryptosytems, so far, only a few ID-based key agreement protocols are one-way and most of them can only provide authentication for only one entity to the other. In this paper, two ID-based one-way key agreement protocols are proposed. The advantage of our protocols is that the authentication of the sender and receiver is established at the same time although the key distribution is only one pass. In addition, transmitted data size in our schemes is very small and the parameter for key agreement consists of just one. In this paper, an additional security attribute for key agreement protocols is defined and the rigorous security of our protocols is estimated. The performance evaluation is also analyzed by comparing our schemes with the previous schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997)

    Google Scholar 

  3. Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  4. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  5. Gentry, C., Silvergerg, A.: Hierarchical ID-based cryptography. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 548–566. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Hess, F.: Efficient identity based signature schemes based on pairings. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 310–324. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Law, L., Menezes, A., Qu, M., Solinas, J., Vanstone, S.: An efficient protocol for authenticated key agreement. Designs, Codes and Cryptogr. 28(2), 119–134 (2003)

    Article  MATH  MathSciNet  Google Scholar 

  8. McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement, Cryptology ePrint Archive, Report 2004/122, available at http://eprint.iacr.org/2004/122/

  9. Menezes, A., Qu, M., Vanstone, S.: Some new key agreement protocols providing mutual implicit authentication. In: Proceedings of Selected Areas in Cryptography– SAC 1995, pp. 22–32 (1995)

    Google Scholar 

  10. Malone-lee, J.: Identity-based signcryption, Cryptology ePrint Archive, Report 2002/098, available at http://eprint.iacr.org/2002/098/

  11. Nalla, D., Reddy, K.C.: Signcryption scheme for identity-based cryptosystems, Cryptology ePrint Archive, Report 2003/066, available at http://eprint.iacr.org/2003/066/

  12. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  13. Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett. 38, 630–632 (2002), Cryptology ePrint Archive, Report 2001/111, available at http://eprint.iacr.org/2001/111/

    Article  MATH  Google Scholar 

  14. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Symp. on Cryptography and Information Security, Okinawa, Japan, January 2000, pp. 26–28 (2000)

    Google Scholar 

  15. Terada, R., Benis Jr., W.D., Okamoto, E.: An IBE scheme to exchange authenticated secre keys. In: Symp. on Cryptography and Information Security, Sendai, Japan, pp. 27–30, 1529-1533 (January 2004)

    Google Scholar 

  16. Okamot, T., Harada, K., Okamoto, E.: ID-based agreement protocols using pairing. In: Symp. on Information Theory and Its Application–ISITA 2004, Parma, Italy (October 2004)

    Google Scholar 

  17. Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) < < cost(signature)+ cost(encryption). In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 165–179. Springer, Heidelberg (1997)

    Google Scholar 

  18. Zhang, F., Liu, S., Kim, K.: ID-based one round authenticated tripartite key agreement protocol with pairings, Cryptology ePrint Archive, Report 2002/122, available at http://eprint.iacr.org/2002/122/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Okamoto, T., Tso, R., Okamoto, E. (2005). One-Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing. In: Torra, V., Narukawa, Y., Miyamoto, S. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2005. Lecture Notes in Computer Science(), vol 3558. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11526018_13

Download citation

  • DOI: https://doi.org/10.1007/11526018_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-27871-9

  • Online ISBN: 978-3-540-31883-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics