Authenticated key exchange with entities from different settings and varied groups

作者: Yanfei Guo , Zhenfeng Zhang

DOI: 10.1002/SEC.868

关键词:

摘要: Authenticated key exchange AKE is a very important primitive in cryptography. In the last decades, many protocols appeared either certificate-based cert-based setting or identity-based id-based setting. real applications, entities from different settings may also have requirement to communicate with each other. Several papers concentrated on supporting multiple certification authorities generation centers, but few considered interoperability between two settings. Furthermore, existing approaches are still inadequate parameters algebraic groups.

参考文章(34)
Dan Boneh, Matt Franklin, Identity-Based Encryption from the Weil Pairing international cryptology conference. pp. 213- 229 ,(2001) , 10.1007/3-540-44647-8_13
Ran Canetti, Hugo Krawczyk, Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels Lecture Notes in Computer Science. pp. 453- 474 ,(2001) , 10.1007/3-540-44987-6_28
Whitfield Diffie, Martin E Hellman, None, New Directions in Cryptography IEEE Transactions on Information Theory. ,vol. 22, pp. 644- 654 ,(1976) , 10.1109/TIT.1976.1055638
Zhaohui Cheng, Liqun Chen, On security proof of McCullagh Barreto's key agreement protocol and its variants International Journal of Security and Networks. ,vol. 2, pp. 251- 259 ,(2007) , 10.1504/IJSN.2007.013178
Kim-Kwang Raymond Choo, Revisit of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols International Journal of Network Security. ,vol. 1, pp. 154- 160 ,(2005) , 10.6633/IJNS.200511.1(3).05
Quan Yuan, Songping Li, A New Efficient ID-Based Authenticated Key Agreement Protocol. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 309- ,(2005)
Keita Xagawa, Kazuki Yoneyama, Koutarou Suzuki, Atsushi Fujioka, Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. IACR Cryptology ePrint Archive. ,vol. 2012, pp. 211- ,(2012)
Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson, Efficient One-Round Key Exchange in the Standard Model Information Security and Privacy. pp. 69- 83 ,(2008) , 10.1007/978-3-540-70500-0_6
Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoğlu, Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys international conference on pairing based cryptography. pp. 187- 205 ,(2010) , 10.1007/978-3-642-17455-1_12