A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols
نویسندگان
چکیده
منابع مشابه
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
We describe a mechanical approach to derive identity-based (ID-based) protocols from existing Diffie–Hellman-based ones. As case studies, we present the ID-based versions of the Unified Model protocol, UMP-ID, Blake-Wilson, Johnson & Menezes (1997)’s protocol, BJM-ID, and Krawczyk (2005)’s HMQV protocol, HMQV-ID. We describe the calculations required to be modified in existing proofs. We conclu...
متن کاملIdentity-Based Key Exchange Protocols without Pairings
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly
متن کاملIdentity Based Authenticated Key Agreement Protocols from Pairings
We investigate a number of issues related to identity based authenticated key agreement protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues include how to make protocols efficient; to avoid key escrow by a Trust Authority (TA) who issues identity based private keys for users, and to allow users to use different TAs. We describe a few authenticated key agree...
متن کاملCryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings
Two-party authenticated key agreement protocol is used to authenticate entities and establish session keys in an open network in order to provide secure communications between two parties. Several security attributes are highly desired for such protocols, such as perfect forward secrecy (the corruption of long-term keys of all the entities should not compromise any session key), PKG forward sec...
متن کاملConstructing Efficient PAKE Protocols from Identity-Based KEM/DEM
In this paper, we propose an efficient identity-based password authenticated key exchange (IBPAKE) protocol using identitybased KEM/DEM. In IBPAKE, a client conducts authentication based on a human-memorable password and a server’s identity. A distinctive feature of IBPAKE protocols, compared to the well-known EKE-type PAKE protocols, is that an adversary who even acquired a user’s password can...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information Sciences
سال: 2014
ISSN: 0020-0255
DOI: 10.1016/j.ins.2014.05.041