Title :
An Enhanced Two-Party Key Agreement Protocol in the Key Escrow Mode
Author :
Hou, Mengbo ; Xu, Qiuliang
Author_Institution :
Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Abstract :
In an open and distributed environment, authenticated key agreement protocol, as an important cryptographic primitive, is used to authenticate entities and establish session key in order to provide secure communications. Key escrow is essential in situations where confidentiality and audit trail are legal requirements, whilst perfect forward secrecy and known session-specific temporary information secrecy attributes are desirable to provide stronger security. In this paper, we give a cryptanalysis on the scheme due to Wang et al., which is based on the identity-based encryption scheme proposed by Gentry (Eurocrypt´06), and then present an enhanced secure two-party identity-based authenticated key agreement protocol. The new proposed protocol achieves most of the required security attributes and can be used properly in the escrow mode. Security analysis shows that it achieves the attributes of known-key secrecy, key-compromise impersonation resilience, unknown key-share resilience and no key control. In addition, it captures the perfect forward secrecy and known session-specific temporary information secrecy attributes.
Keywords :
cryptographic protocols; distributed processing; message authentication; public key cryptography; cryptanalysis; cryptographic primitive; distributed environment; identity-based authenticated key agreement protocol; identity-based encryption scheme; key escrow mode; key-compromise impersonation resilience; known session-specific temporary information secrecy attributes; known-key secrecy; no key control; perfect forward secrecy; secure communications; security analysis; security attributes; unknown key-share resilience; Authentication; Communication system control; Computer science; Computer security; Cryptographic protocols; Identity-based encryption; Information security; Law; Legal factors; Resilience; key agreement protocol; key control; key escrow; key-compromise impersonation; perfect forward secrecy;
Conference_Titel :
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3843-3
Electronic_ISBN :
978-1-4244-5068-8
DOI :
10.1109/MINES.2009.11