DocumentCode :
589786
Title :
An ID-based key agreement protocol based on ECC among users of separate networks
Author :
Farash, M.S. ; Attari, Mahmoud Ahmadian
Author_Institution :
Dept. of Math. & Comput. Sci., Kharazmi (Tarbiat Moallem) Univ., Tehran, Iran
fYear :
2012
fDate :
13-14 Sept. 2012
Firstpage :
32
Lastpage :
37
Abstract :
This paper proposes an identity based key agreement protocol based on elliptic curve cryptography (ECC) between users of different networks with independent private key generations (PKGs). Instead of bilinear pairings which commonly used for contracting identity based schemes, the proposed protocol makes use of elliptic curves to obtain more computational efficiency. The proposed protocol develops Cao et al´s protocol for situations that two users of independent organizations or networks with separate servers want to share a secret key via an insecure link. The main novelty of this paper is security proof of the proposed protocol in the random oracle model. The security proof argues the security attributes of the proposed protocol.
Keywords :
contracts; cryptographic protocols; network servers; private key cryptography; public key cryptography; random processes; ECC; ID-based key agreement protocol; bilinear pairings; computational efficiency; elliptic curve cryptography; identity based key agreement protocol; identity based schemes; independent networks; independent organizations; independent private key generations; insecure link; protocol; random oracle model; secret key; security attributes; security proof; Elliptic curve cryptography; Elliptic curves; Games; Protocols; Elliptic Curve Cryptography; ID-Based Cryptography; Key Agreement Protocol; Random Oracle Model;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on
Conference_Location :
Tabriz
Print_ISBN :
978-1-4673-2387-1
Type :
conf
DOI :
10.1109/ISCISC.2012.6408187
Filename :
6408187
Link To Document :
بازگشت