Skip to main content

Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5585))

Abstract

It is often a challenging task to make a system satisfy desirable security properties and maintain a low computational overhead. In this paper, we attempt to minimize the gap for two identity-based key agreement protocols, in the sense that we allow our key agreement protocols to satisfy all general desirable security properties including master-key forward security and in the meanwhile achieve a good computational efficiency. Our protocols are novel, since we are able to make use of several nice algebraic properties of the Weil Pairing to outperform other state-of-the-art key agreement protocols. To our knowledge, our second protocol is the first identity-based protocol that provides master key forward security and satisfies all basic desirable security properties based on the key extraction algorithm due to Sakai and Kasahara.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  2. Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing. In: Proceedings of Symposium on Cryptography and Information Security, Okinawa, Japan (2000)

    Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Sakai, R., Kasahara, M.: ID based cryptosystems with pairing on elliptic curve, Cryptology ePrint Archive, Report 2003/054 2003

    Google Scholar 

  5. Chen, L., et al: Identity-based Key Agreement Protocols From Pairings. International Journal Information Security 6, 213–241 (2007)

    Article  Google Scholar 

  6. Smart, N.P.: An identity based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 38, 630–632 (2002)

    Article  MATH  Google Scholar 

  7. Shim, K.: Efficient ID-based authenticated key agreement protocol based on the Weil pairing. Electronics Letters 39, 653–654 (2003)

    Article  MathSciNet  Google Scholar 

  8. Chen, L., Kudla, C.: Identity based authenticated key agreement from pairings. In: Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233 (2003)

    Google Scholar 

  9. McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Xie, G.: An ID-based key agreement scheme from pairing. Cryptology ePrint Archive, Report 2005/093 (2005)

    Google Scholar 

  11. Li, S., et al.: Towards security two-part authenticated key agreement protocols. Cryptology ePrint Archive, Report 2005/300 (2005)

    Google Scholar 

  12. Mitsunari, S., et al: A new traitor tracing. IEICE Trans. Fundamentals 85, 481–484 (2002)

    Google Scholar 

  13. Blake-Wilson, S., et al: Key agreement protocols and their security analysis. In: Darnell, M.J. (ed.) Cryptography and Coding 1997. LNCS, vol. 1355, pp. 30–45. Springer, Heidelberg (1997)

    Google Scholar 

  14. Cheng, Z., et al.: On the indistinguishability-based security model of key agreement protocols-simple cases. In: Proceedings of ACNS 2004 (technical track) (2004)

    Google Scholar 

  15. Bellare, M., Rogaway, P.: Entity authentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)

    Google Scholar 

  16. Cheng, Z., Chen, L., Comley, R., Tang, Q.: Identity-based key agreement with unilateral identity privacy using pairings. In: Chen, K., Deng, R., Lai, X., Zhou, J. (eds.) ISPEC 2006. LNCS, vol. 3903, pp. 202–213. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Cheng, Z., Chen, L.: On security proof of McCullagh-Barreto’s key agreemnet protocol and its variants. Int. J. of Security and Networks 2(3/4), 251–259 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guo, H., Mu, Y., Zhang, X., Li, Z. (2009). Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. In: Zhang, D., Portmann, M., Tan, AH., Indulska, J. (eds) Ubiquitous Intelligence and Computing. UIC 2009. Lecture Notes in Computer Science, vol 5585. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02830-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02830-4_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02829-8

  • Online ISBN: 978-3-642-02830-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics