DocumentCode :
3076450
Title :
An Efficient ID-Based Authenticated Key Exchange Protocol
Author :
Hu, Xuexian ; Liu, Wenfen ; Zhang, Jianhui
Author_Institution :
Zhengzhou Inf. Sci. & Technol. Inst., Zhengzhou, China
Volume :
2
fYear :
2009
fDate :
10-11 July 2009
Firstpage :
229
Lastpage :
233
Abstract :
It´s well known that the ID-based authenticated key exchange protocol is surprisingly difficult to design and prove, since it is difficult for simulator to fully support the SessionKeyReveal query without static private key. The purported security of many ID-based protocols is either based on heuristic security arguments or the protocols are proven secure in a restricted model. In this paper, we propose an efficient ID-based authenticated key exchange protocol, called EIDAKE, which is provably secure in the currently strongest AKE security model, the eCK model. The protocol achieves the efficiency of the most efficient ID-based AKE protocol in terms of exponentiation. Moreover, our protocol enjoys a simple and intuitive reduction.
Keywords :
cryptographic protocols; query processing; EIDAKE security model; ID-based authenticated key exchange protocol; SessionKeyReveal query; heuristic security; Cryptographic protocols; DH-HEMTs; Design engineering; Elliptic curve cryptography; Identity-based encryption; Information science; Public key cryptography; Security; Switching systems; Testing; Authenticated key exchange; Computational Diffie-Hellman assumption; Gap Bilinear Diffie-Hellman assumption; ID-based; Provably secure;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Engineering, 2009. ICIE '09. WASE International Conference on
Conference_Location :
Taiyuan, Chanxi
Print_ISBN :
978-0-7695-3679-8
Type :
conf
DOI :
10.1109/ICIE.2009.23
Filename :
5211427
Link To Document :
بازگشت