Title | ||
---|---|---|
Strongly secure identity-based authenticated key agreement protocols in the escrow mode |
Abstract | ||
---|---|---|
Escrowable identity-based authenticated key agreement(AKA) protocols are desirable under certain circumstances especially in certain closed groups applications.In this paper,we focus on two-party identitybased AKA schemes in the escrow mode,and present a strongly secure escrowable identity-based AKA protocol which captures all basic desirable security properties including perfect forward secrecy,ephemeral secrets reveal resistance and so on.The protocol is provably secure in the extended Canetti-Krawczyk model,and its security can be reduced to the standard computational bilinear Diffie-Hellman assumption in the random oracle model.Assuming no adversary can obtain the master private key for the escrow mode,our scheme is secure as long as each party has at least one uncompromised secret.Also,we present two strongly secure variants of the protocol,which are computationally more efficient than the original scheme. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1007/s11432-011-4520-4 | SCIENCE CHINA Information Sciences |
Keywords | Field | DocType |
identity-based cryptography,authenticated key agreement,key escrow,provable security,bilinear diffie-hellman assumption | Escrow,Authentication,Computer security,Random oracle,Forward secrecy,Adversary,Public-key cryptography,Key escrow,Mathematics,Provable security | Journal |
Volume | Issue | ISSN |
56 | 8 | 1869-1919 |
Citations | PageRank | References |
27 | 0.53 | 20 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Liang Ni | 1 | 56 | 2.09 |
Gong-Liang Chen | 2 | 160 | 13.54 |
Jian-hua Li | 3 | 558 | 98.16 |
Yanyan Hao | 4 | 45 | 1.50 |