Abstract
It is often a challenging task to make a system satisfy desirable security properties and maintain a low computational overhead. In this paper, we attempt to minimize the gap for two identity-based key agreement protocols, in the sense that we allow our key agreement protocols to satisfy all general desirable security properties including master-key forward security and in the meanwhile achieve a good computational efficiency. Our protocols are novel, since we are able to make use of several nice algebraic properties of the Weil Pairing to outperform other state-of-the-art key agreement protocols. To our knowledge, our second protocol is the first identity-based protocol that provides master key forward security and satisfies all basic desirable security properties based on the key extraction algorithm due to Sakai and Kasahara.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Proceedings of Symposium on Cryptography and Information Security, Okinawa, Japan (2000)
Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive, Report 2003/054 2003
Chen, L., et al: Identity-based Key Agreement Protocols From Pairings. International Journal Information Security 6, 213–241 (2007)
Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 38, 630–632 (2002)
Shim, K.: Efficient ID-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 39, 653–654 (2003)
Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233 (2003)
McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005)
Xie, G.: An ID-based key agreement scheme from pairing. Cryptology ePrint Archive, Report 2005/093 (2005)
Li, S., et al.: Towards security two-part authenticated key agreement protocols. Cryptology ePrint Archive, Report 2005/300 (2005)
Mitsunari, S., et al: A new traitor tracing. IEICE Trans. Fundamentals 85, 481–484 (2002)
Blake-Wilson, S., et al: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997)
Cheng, Z., et al.: On the indistinguishability-based security model of key agreement protocols-simple cases. In: Proceedings of ACNS 2004 (technical track) (2004)
Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)
Cheng, Z., Chen, L., Comley, R., Tang, Q.: Identity-based key agreement with unilateral identity privacy using pairings. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 202–213. Springer, Heidelberg (2006)
Cheng, Z., Chen, L.: On security proof of McCullagh-Barreto’s key agreemnet protocol and its variants. Int. J. of Security and Networks 2(3/4), 251–259 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Guo, H., Mu, Y., Zhang, X., Li, Z. (2009). Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. In: Zhang, D., Portmann, M., Tan, AH., Indulska, J. (eds) Ubiquitous Intelligence and Computing. UIC 2009. Lecture Notes in Computer Science, vol 5585. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02830-4_24
Download citation
DOI: https://doi.org/10.1007/978-3-642-02830-4_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02829-8
Online ISBN: 978-3-642-02830-4
eBook Packages: Computer ScienceComputer Science (R0)