Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Authors

Abstract:

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is generated by a trusted Private Key Generator (PKG). However, it is unrealistic to assume that a single PKG will be responsible for issuing private keys to members of different organizations or a large-scale nation. Hence, it is needed to consider multiple PKG environments with different system parameters. In this paper, we propose an identity-based key agreement protocol among users of different networks with independent PKGs, which makes use of elliptic curves. We prove the security of the proposed protocol in the random oracle model and show that all security attributes are satisfied. We also demonstrate a comparison between our protocol and some related protocols in terms of the communication costs and the execution time. The results show that the execution time of our protocol is less than 10%, and its communication costs are about 50% of the competitor protocols.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Provably Secure and Efficient Identity-BasedKeyAgreement Protocol for Independent PKGsUsing ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently identity-based key agreement protocols have been increasingly researched because of the simplicity of a public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is...

full text

A new provably secure authentication and key agreement protocol for SIP using ECC

SIP is playing a key role in the IP based services and has been chosen as the protocol for multimedia application in 3G mobile networks by the Third-Generation Partnership Project. The authentication mechanism proposed in SIP specification is HTTP digest based authentication, which allows malicious parties to impersonate other parties or to charge calls to other parties, furthermore, other secu...

full text

An Efficient ECC-based Authentication and Key Agreement Protocol

Public-key cryptography is commonly used to authenticate communicating entities in some networks. One of the key tools in this way is to use the elliptic curves cryptography (ECC) which is relatively lightweight due to its shorter key size compared to the conventional River-Shamir-Adleman (RSA) method. This paper is proposing an efficient protocol by analysing two variants of ECC-based wireless...

full text

On the Security of Wang's Provably Secure Identity-based Key Agreement Protocol

In a 2005 IACR report, Wang published an efficient identity-based key agreement protocol (IDAK) suitable for resource constrained devices. The author shows that the IDAK key agreement protocol is secure in the BellareRogaway model with random oracles and also provides separate ad-hoc security proofs claiming that the IDAK protocol is not vulnerable to Key Compromise Impersonation attacks and al...

full text

Provably secure one-round identity-based authenticated asymmetric group key agreement protocol

The newly introduced notion of asymmetric group key agreement (AGKA) enables external users to securely send messages to group members. The existing AGKA is only secure against passive attacks which are too weak to capture the attacks in the real world. In this paper, we formalize an active security model for identity-based authenticated asymmetric group key agreement (IB-AAGKA). We then presen...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 5  issue 1

pages  55- 70

publication date 2013-01-01

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023