Abstract
The modern Internet technology era requires secure key agreement protocols, which are playing a significant role in the field of cryptography and network security. These protocols are mainly designed to establish a common session key between different parties. It can be easily found that various key agreement protocols are designed in the literature. However, many of these protocols are either proven insecure or have a burden of communication and computational cost. Therefore, a more secure key agreement protocol is needed. This paper exhibits an identity-based three-party authenticated key agreement (ID-3PAKA) protocol is devised, which securely and efficiently negotiates a common secret session key among three parties over the Internet. This protocol is based on the elliptic curve cryptography (ECC). It uses the idea of identity-based encryption (IBE) with bilinear pairings. The security of the proposed work is based on the hardness assumption of the discrete logarithm problem (DL) and elliptic curve. Further, we show that the proposed protocol ensures the known security properties of the session key.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference, pp. 213–229. Springer (2001)
Choo, K.K.R.: Revisit of McCullagh-Barreto two-party ID-based authenticated key agreement protocols. Int. J. Netw. Secur. 1(3), 154–160 (2005)
Chou, C.H., Tsai, K.Y., Lu, C.F.: Two ID-based authenticated schemes with key agreement for mobile environments. J. Supercomput. 66(2), 973–988 (2013)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Farash, M.S., Islam, S.H., Obaidat, M.S.: A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks. Concurr. Comput. Pract. Exp. 27(17), 4897–4913 (2015)
Gupta, D.S., Biswas, G.P.: Identity-based/attribute-based cryptosystem using threshold value without Shamir’s secret sharing. In: 2015 International Conference on Signal Processing, Computing and Control (ISPCC), pp. 307–311. IEEE (2015)
Gupta, D.S., Biswas, G.P.: Securing voice call transmission over cellular communication. Procedia Comput. Sci. 57, 752–756 (2015)
Gupta, D.S., Biswas, G.P.: An ECC-based authenticated group key exchange protocol in IBE framework. Int. J. Commun. Syst. 30(18), e3363 (2017)
Gupta, D.S., Biswas, G.P.: On securing bi-and tri-partite session key agreement protocol using IBE framework. Wirel. Pers. Commun. 96(3), 4505–4524 (2017)
He, D., Chen, Y., Chen, J.: An ID-based three-party authenticated key exchange protocol using elliptic curve cryptography for mobile-commerce environments. Arab. J. Sci. Eng. 38(8), 2055–2061 (2013)
Hölbl, M., Welzer, T., Brumen, B.: Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput. Secur. 29(2), 244–252 (2010)
Hölbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1), 142–150 (2012)
Islam, S.H., Amin, R., Biswas, G.P., Farash, M.S., Li, X., Kumari, S.: An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments. J. King Saud Univ. Comput. Inf. Sci. 29(3), 311–324 (2017)
Islam, S.H., Biswas, G.P.: A more efficient and secure ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. J. Syst. Softw. 84(11), 1892–1898 (2011)
Islam, S.H., Obaidat, M.S., Vijayakumar, P., Abdulhay, E., Li, F., Reddy, M.K.C.: A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs. Future Gener. Comput. Syst. 84, 216–227 (2018)
Jeong, I.R., Katz, J., Lee, D.H.: One-round protocols for two-party authenticated key exchange. In: International Conference on Applied Cryptography and Network Security, pp. 220–232. Springer (2004)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
McCullagh, N., Barreto, P.S.: A new two-party identity-based authenticated key agreement. In: Cryptographers’ Track at the RSA Conference, pp. 262–274. Springer (2005)
Miller, V.S.: Use of elliptic curves in cryptography. In: Conference on the Theory and Application of Cryptographic Techniques, pp. 417–426. Springer (1985)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer (1984)
Tseng, Y.M.: An efficient two-party identity-based key exchange protocol. Informatica 18(1), 125–136 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Gupta, D.S., Hafizul Islam, S.K., Obaidat, M.S. (2020). A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings. In: Raj, J., Bashar, A., Ramson, S. (eds) Innovative Data Communication Technologies and Application. ICIDCA 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 46. Springer, Cham. https://doi.org/10.1007/978-3-030-38040-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-38040-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-38039-7
Online ISBN: 978-3-030-38040-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)