Title :
Provably secure identity-based authenticated key agreement protocol and its application
Author :
Shuai Shao ; Bin Tian ; Xin Wang ; Yang Li
Author_Institution :
China Inf. Technol. Security Evaluation Center, Beijing, China
fDate :
Oct. 30 2012-Nov. 1 2012
Abstract :
We point out the RYY+ identity-based (ID-based) key agreement protocol is vulnerable to Key-compromise impersonation (KCI) attack and Intermediate results leakage (IRL) attack. Then we give the improved protocol which provides KCI and IRL resistance. The novel protocol is provably secure under the gap Bilinear Diffie-Hellman assumption in the seCK model, which enhances the adversary´s queries comparing with previous ID based AKE models. The proposed scheme also has an advantage over most previous schemes on security and efficiency.
Keywords :
cryptographic protocols; KCI attack; RYY+ identity-based key agreement protocol; gap bilinear Diffie-Hellman assumption; intermediate results leakage attack; key-compromise impersonation attack; provably secure identity-based authenticated key agreement protocol; seCK model; Authentication; Barium; Computational modeling; Cryptography; Protocols; Servers; ID-based; SIP; authenticated key exchange; provable security;
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
DOI :
10.1109/CCIS.2012.6664582