Strongly-Secure Identity-Based Key Agreement and Anonymous Extension

作者: Sherman S. M. Chow , Kim-Kwang Raymond Choo

DOI: 10.1007/978-3-540-75496-1_14

关键词: Protocol (science)Provable securityAnonymityComputer securityRandom oracleKey-agreement protocolAdversaryUniversal composabilityComputer scienceOracle

摘要: We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in random oracle model, only a weak adversarial model is considered - adversary not allowed to ask Session-Key Reveal queries that will allow learn previously established session keys. Recent research efforts devoted providing stronger level require strong assumptions, such as assuming simulator has access non-existential computational or decisional oracle. In this work, we propose an ID-based protocol and prove its widely accepted indistinguishability-based Canetti Krawczyk. our proof, does any then extend basic support ad-hoc anonymous with bilateral privacy. To best knowledge, first kind are for fixed group provide unilateral privacy (i.e., one participants enjoy anonymity).

参考文章(38)
DongGook Park, Colin Boyd, Public key protocols for wireless communications. international conference on information security and cryptology. pp. 47- 57 ,(1998)
Kim-Kwang Raymond Choo, Key establishment : proofs and refutations Queensland University of Technology. ,(2006)
Hung-Min Sun, Bin-Tsan Hsieh, Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings. IACR Cryptology ePrint Archive. ,vol. 2003, pp. 113- ,(2003)
Caroline Kudla, Kenneth G. Paterson, Modular Security Proofs for Key Agreement Protocols Lecture Notes in Computer Science. pp. 549- 565 ,(2005) , 10.1007/11593447_30
Zhaohui Cheng, Liqun Chen, Richard Comley, Qiang Tang, Identity-Based Key Agreement with Unilateral Identity Privacy Using Pairings Information Security Practice and Experience. pp. 202- 213 ,(2006) , 10.1007/11689522_19
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings ieee computer security foundations symposium. pp. 219- 233 ,(2003) , 10.1109/CSFW.2003.1212715
Sherman S. M. Chow, S. M. Yiu, Lucas C. K. Hui, K. P. Chow, Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity international conference on information security and cryptology. pp. 352- 369 ,(2003) , 10.1007/978-3-540-24691-6_26
Simon Blake-Wilson, Don Johnson, Alfred Menezes, Key Agreement Protocols and Their Security Analysis Lecture Notes in Computer Science. pp. 30- 45 ,(1997) , 10.1007/BFB0024447
Richard Comley, Zhaohui Cheng, Manos Nistazakis, Luminita Vasiu, On The Indistinguishability-Based Security Model of Key Agreement Protocols-Simple Cases. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 129- ,(2005)
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21