Abstract | ||
---|---|---|
In real applications of (public key-based) cryptosystems, hierarchical structures are often used to distribute the workload by delegating key generation. However, there is few previous study about such a hierarchical structure in the ID-based authenticated key exchange (AKE) scenario. In this paper, we introduce first hierarchical ID-based AKE resilient to ephemeral secret key leakage. Firstly, we provide a formal security model for hierarchical ID-based AKE. Our model is based on eCK security to guarantee resistance to leakage of ephemeral secret keys. We also propose an eCK secure hierarchical ID-based AKE protocol based on a hierarchical ID-based encryption. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-16825-3_12 | IWSEC |
Keywords | Field | DocType |
hierarchical structure,hierarchical ID-based AKE,hierarchical ID-based AKE protocol,hierarchical ID-based encryption,ID-based authenticated key exchange,ephemeral secret key,key generation,secret key leakage,eCK security,formal security model | Key generation,Internet privacy,Leakage (electronics),Computer science,Computer security,Authenticated Key Exchange,Computer network,Cryptosystem,Encryption,Ephemeral key,Delegation,Computer security model | Conference |
Volume | Issue | ISSN |
94-A | 6 | 0302-9743 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Atsushi Fujioka | 1 | 602 | 42.75 |
Koutarou Suzuki | 2 | 518 | 29.57 |
kazuki | 3 | 67 | 10.08 |