Title :
An Efficient ID-Based Authenticated Key Exchange Protocol
Author :
Hu, Xuexian ; Liu, Wenfen ; Zhang, Jianhui
Author_Institution :
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
Abstract :
It´s well known that the ID-based authenticated key exchange protocol is surprisingly difficult to design and prove, since it is difficult for simulator to fully support the SessionKeyReveal query without static private key. The purported security of many ID-based protocols is either based on heuristic security arguments or the protocols are proven secure in a restricted model. In this paper, we propose an efficient ID-based authenticated key exchange protocol, called EIDAKE, which is provably secure in the currently strongest AKE security model, the eCK model. The protocol achieves the efficiency of the most efficient ID-based AKE protocol in terms of exponentiation. Moreover, our protocol enjoys a simple and intuitive reduction.
Keywords :
cryptographic protocols; query processing; EIDAKE security model; ID-based authenticated key exchange protocol; SessionKeyReveal query; heuristic security; Cryptographic protocols; DH-HEMTs; Design engineering; Elliptic curve cryptography; Identity-based encryption; Information science; Public key cryptography; Security; Switching systems; Testing; Authenticated key exchange; Computational Diffie-Hellman assumption; Gap Bilinear Diffie-Hellman assumption; ID-based; Provably secure;
Conference_Titel :
Information Engineering, 2009. ICIE '09. WASE International Conference on
Conference_Location :
Taiyuan, Chanxi
Print_ISBN :
978-0-7695-3679-8
DOI :
10.1109/ICIE.2009.23