• DocumentCode
    2877600
  • Title

    A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme

  • Author

    Yang Cai ; Qiuliang Xu ; Zhihua Zheng

  • Author_Institution
    Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
  • fYear
    2012
  • fDate
    17-18 Nov. 2012
  • Firstpage
    636
  • Lastpage
    640
  • Abstract
    In this paper, we present a two-party key agreement protocol, which is secure in standard model. By using the Goldreich-Levin hardcore predicate, we reduce the security of our scheme to Computational Bilinear Diffie-Hellman assumption, and a proof is given. Furthermore, with the consistency of messages exchanged publicly verifiable, our scheme achieves most of the known security attributes.
  • Keywords
    cryptographic protocols; data encapsulation; Goldreich-Levin hardcore predicate; computational bilinear Diffie-Hellman assumption; key encapsulation; provably secure identity-based key agreement protocol; two-party key agreement protocol; Computational modeling; Cryptography; Encapsulation; Games; Protocols; Standards; Computational Bilinear Diffie-Hellman; identity-based cryptography; key agreement protocol; standard model;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security (CIS), 2012 Eighth International Conference on
  • Conference_Location
    Guangzhou
  • Print_ISBN
    978-1-4673-4725-9
  • Type

    conf

  • DOI
    10.1109/CIS.2012.147
  • Filename
    6405917