Skip to main content

2015 | OriginalPaper | Buchkapitel

A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings

verfasst von : Seyed-Mohsen Ghoreishi, Ismail Fauzi Isnin, Shukor Abd Razak, Hassan Chizari

Erschienen in: Pattern Analysis, Intelligent Security and the Internet of Things

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Many Identity-Based two-party Key Agreement protocols have been proposed in recent years. Some of them are built on pairing maps, whereas some others could eliminate the pairings in order to decrease the complexity of computation. In this paper, we proposed a secure pairing-free Identity-Based two-party Key Agreement protocol which besides supporting security requirements uses less computational cost in comparison with existing related works.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology—Crypto 1984. Lecture Notes in Computer Science 196, Springer, Berlin (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology—Crypto 1984. Lecture Notes in Computer Science 196, Springer, Berlin (1984)
2.
Zurück zum Zitat Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. In: Advances in Cryptology—Crypto (2001) Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. In: Advances in Cryptology—Crypto (2001)
3.
Zurück zum Zitat Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett. 38, 630–632 (2002)MATHCrossRef Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electron. Lett. 38, 630–632 (2002)MATHCrossRef
4.
Zurück zum Zitat Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. In: IEEE Computer Security Foundations Workshop, pp. 219–233 (2003) Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. In: IEEE Computer Security Foundations Workshop, pp. 219–233 (2003)
5.
Zurück zum Zitat Yuan, Q., Li, S.A.: A new efficient ID-based authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/309 (2005) Yuan, Q., Li, S.A.: A new efficient ID-based authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/309 (2005)
6.
Zurück zum Zitat Wang, Y.: Efficient Identity-based and authenticated key agreement protocols. Transactions on Computational Science Xvii (2013) Wang, Y.: Efficient Identity-based and authenticated key agreement protocols. Transactions on Computational Science Xvii (2013)
7.
Zurück zum Zitat Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)CrossRef Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)CrossRef
8.
Zurück zum Zitat Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180, 2895–2903 (2010)MATHMathSciNetCrossRef Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180, 2895–2903 (2010)MATHMathSciNetCrossRef
9.
Zurück zum Zitat Zhu, R.W., Yang, G., Wong, D.S.: An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theor. Comput. Sci. 9, 198–207 (2007)MathSciNetCrossRef Zhu, R.W., Yang, G., Wong, D.S.: An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theor. Comput. Sci. 9, 198–207 (2007)MathSciNetCrossRef
10.
Zurück zum Zitat Cao, X., Kou, W., Yu, Y., Sun, R.: Identity-based authentication key agreement protocols without bilinear pairings. IEICE Trans. Fundam. 91(12), 3833–3836 (2008)CrossRef Cao, X., Kou, W., Yu, Y., Sun, R.: Identity-based authentication key agreement protocols without bilinear pairings. IEICE Trans. Fundam. 91(12), 3833–3836 (2008)CrossRef
11.
Zurück zum Zitat Islam, S.K.H., Biswas, G.P.: An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Eng. 30, 499–507. ISSN 1877-7058 (2012) Islam, S.K.H., Biswas, G.P.: An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Eng. 30, 499–507. ISSN 1877-7058 (2012)
12.
Zurück zum Zitat Farash, M.S., Attari, M.A.: A pairing-free ID-based key agreement protocol with different PKGs. Int. J. Netw. Secur. 16(2), 143–148 (2014)MathSciNet Farash, M.S., Attari, M.A.: A pairing-free ID-based key agreement protocol with different PKGs. Int. J. Netw. Secur. 16(2), 143–148 (2014)MathSciNet
13.
Zurück zum Zitat Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Archieve, Report 2005/129 (2005) Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Archieve, Report 2005/129 (2005)
14.
Zurück zum Zitat Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Proceedings of the 6th IMA International Conference on Cryptography and Coding, vol. 1335, pp. 30−45, LNCS, Springer, Berlin (1997) Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Proceedings of the 6th IMA International Conference on Cryptography and Coding, vol. 1335, pp. 30−45, LNCS, Springer, Berlin (1997)
Metadaten
Titel
A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings
verfasst von
Seyed-Mohsen Ghoreishi
Ismail Fauzi Isnin
Shukor Abd Razak
Hassan Chizari
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-17398-6_26