DocumentCode :
643982
Title :
Provably secure identity-based authenticated key agreement protocol and its application
Author :
Shuai Shao ; Bin Tian ; Xin Wang ; Yang Li
Author_Institution :
China Inf. Technol. Security Evaluation Center, Beijing, China
Volume :
03
fYear :
2012
fDate :
Oct. 30 2012-Nov. 1 2012
Firstpage :
1240
Lastpage :
1244
Abstract :
We point out the RYY+ identity-based (ID-based) key agreement protocol is vulnerable to Key-compromise impersonation (KCI) attack and Intermediate results leakage (IRL) attack. Then we give the improved protocol which provides KCI and IRL resistance. The novel protocol is provably secure under the gap Bilinear Diffie-Hellman assumption in the seCK model, which enhances the adversary´s queries comparing with previous ID based AKE models. The proposed scheme also has an advantage over most previous schemes on security and efficiency.
Keywords :
cryptographic protocols; KCI attack; RYY+ identity-based key agreement protocol; gap bilinear Diffie-Hellman assumption; intermediate results leakage attack; key-compromise impersonation attack; provably secure identity-based authenticated key agreement protocol; seCK model; Authentication; Barium; Computational modeling; Cryptography; Protocols; Servers; ID-based; SIP; authenticated key exchange; provable security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Cloud Computing and Intelligent Systems (CCIS), 2012 IEEE 2nd International Conference on
Conference_Location :
Hangzhou
Print_ISBN :
978-1-4673-1855-6
Type :
conf
DOI :
10.1109/CCIS.2012.6664582
Filename :
6664582
Link To Document :
بازگشت