DocumentCode :
2898065
Title :
An Enhanced Two-Party Key Agreement Protocol in the Key Escrow Mode
Author :
Hou, Mengbo ; Xu, Qiuliang
Author_Institution :
Sch. of Comput. Sci. & Technol., Shandong Univ., Jinan, China
Volume :
2
fYear :
2009
fDate :
18-20 Nov. 2009
Firstpage :
430
Lastpage :
433
Abstract :
In an open and distributed environment, authenticated key agreement protocol, as an important cryptographic primitive, is used to authenticate entities and establish session key in order to provide secure communications. Key escrow is essential in situations where confidentiality and audit trail are legal requirements, whilst perfect forward secrecy and known session-specific temporary information secrecy attributes are desirable to provide stronger security. In this paper, we give a cryptanalysis on the scheme due to Wang et al., which is based on the identity-based encryption scheme proposed by Gentry (Eurocrypt´06), and then present an enhanced secure two-party identity-based authenticated key agreement protocol. The new proposed protocol achieves most of the required security attributes and can be used properly in the escrow mode. Security analysis shows that it achieves the attributes of known-key secrecy, key-compromise impersonation resilience, unknown key-share resilience and no key control. In addition, it captures the perfect forward secrecy and known session-specific temporary information secrecy attributes.
Keywords :
cryptographic protocols; distributed processing; message authentication; public key cryptography; cryptanalysis; cryptographic primitive; distributed environment; identity-based authenticated key agreement protocol; identity-based encryption scheme; key escrow mode; key-compromise impersonation resilience; known session-specific temporary information secrecy attributes; known-key secrecy; no key control; perfect forward secrecy; secure communications; security analysis; security attributes; unknown key-share resilience; Authentication; Communication system control; Computer science; Computer security; Cryptographic protocols; Identity-based encryption; Information security; Law; Legal factors; Resilience; key agreement protocol; key control; key escrow; key-compromise impersonation; perfect forward secrecy;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Multimedia Information Networking and Security, 2009. MINES '09. International Conference on
Conference_Location :
Hubei
Print_ISBN :
978-0-7695-3843-3
Electronic_ISBN :
978-1-4244-5068-8
Type :
conf
DOI :
10.1109/MINES.2009.11
Filename :
5368336
Link To Document :
بازگشت