Title :
A one-round ID-based authenticated key agreement protocol with enhanced security
Author :
Hou, Meng-bo ; Xu, Qiu-liang
Author_Institution :
Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Abstract :
Authenticated key agreement protocol is used to set up the session key and establish secure channel for network communication in the open environment. So far, great deals of identity-based protocols have been proposed to provide robust mutual authentication and key establishment in the two-party setting. Majority of the existing identity-based key agreement protocols require expensive bilinear pairing operation and only provide limited security attributes. Therefore, such protocols are unsuitable for real-world applications that require stronger sense of secrecy. In this paper, we first analysis some of the schemes proposed recently, and then present a one-round ID-based authenticated key agreement protocol with enhanced security attributes, which doesn´t need pairing operation and achieves most of the required security attributes, such as known-key secrecy, perfect forward secrecy, PKG Forward Secrecy, key-compromise impersonation resilience, unknown key-share resilience and no key control. In addition, it captures the enhanced security attributes-Known session-specific temporary key information secrecy.
Keywords :
cryptographic protocols; public key cryptography; telecommunication security; PKG forward secrecy attribute; authenticated key agreement protocol; bilinear pairing operation; identity-based protocol; key-compromise impersonation resilience attribute; known-key secrecy attribute; mutual authentication; network communication security channel; no-key control attribute; one-round identification; perfect forward secrecy attribute; security attribute; temporary key information secrecy attribute; unknown key-share resilience attribute; Authentication; Barium; Elliptic curve cryptography; Elliptic curves; Protocols; Resilience; Known session-specific temporary key information secrecy; PKG Forward Secrecy; identity-based cryptography; key agreement; perfect forward secrecy;
Conference_Titel :
Intelligent Control and Information Processing (ICICIP), 2011 2nd International Conference on
Conference_Location :
Harbin
Print_ISBN :
978-1-4577-0813-8
DOI :
10.1109/ICICIP.2011.6008230