๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Efficient identity-based authenticated multiple key exchange protocol

โœ Scribed by Zuowen Tan


Publisher
Elsevier Science
Year
2011
Tongue
English
Weight
226 KB
Volume
37
Category
Article
ISSN
0045-7906

No coin nor oath required. For personal study only.

โœฆ Synopsis


Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the proposed protocol is provably secure in the random oracle model under the BDH assumptions. The proposed identity-based multiple key exchange protocol is secure in a formal security model under the random oracle model upon the CDH assumptions and the BDH assumptions. Compared with the identity-based multiple key exchange protocols in the literature, the proposed protocol is more efficient and holds stronger security.


๐Ÿ“œ SIMILAR VOLUMES


Enhancements of authenticated multiple k
โœ Duc-Liem Vo; Hyunrok Lee; Chan-Yeob Yeun; Kwangjo Kim ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 160 KB

Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate

Strongly secure identity-based authentic
โœ Liang Ni; Gongliang Chen; Jianhua Li; Yanyan Hao ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 272 KB

In this paper, we present a strongly secure identity-based (ID-based) two-party authenticated key agreement (AKA) protocol, which captures all basic desirable security properties including master key forward secrecy, ephemeral secrets reveal resistance and so on, and is provably secure in the extend