Abstract
The majority of existing escrowable identity-based key agreement protocols only provide partial forward secrecy. Such protocols are, arguably, not suitable for many real-word applications, as the latter tends to require a stronger sense of forward secrecy—perfect forward secrecy. In this paper, we propose an efficient perfect forward-secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Bilinear Diffie-Hellman (GBDH) problem.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Blake-Wilson S, Menezes A. Authenticated Diffie-Hellman key agreement protocols. In: Proc of SAC 1998, LNCS vol. 1556. New York: Springer-Verlag, 1999. 339–361
Shamir A. Identity-based cryptosystems and signature schemes. In: Proc of CRYPTO 1984, LNCS vol. 196. New York: Springer-Verlag, 1984. 47–53
Boneh D, Franklin M. Identity-based encryption from the Weil pairing. In: Proc of CRTPTO 2001, LNCS vol. 2139. New York: Springer-Verlag, 2001. 213–229
Boyd C, Choo K-K R. Security of two-party identity-based key agreement. In: Proc of MYCRYPT 2005, LNCS vol. 3715. New York: Springer-Verlag, 2005. 229–243
Smart N P. An identity based authenticated key agreement protocol based on the Weil pairing. Electron Lett, 2002, 38(13): 630–632
Shim K. Efficient ID-based authenticated key agreement protocol based on the Weil pairing. Electron Lett, 2003, 39(8): 653–654
Chen L, Kudla C. Identity based key agreement protocols from pairings. In: Proc of the 16th IEEE Computer Security Foundations Workshop. New York: IEEE Computer Society, 2002. 219–213 (See also Cryptology ePrint Archive, Report 2002/184.)
Sun H, Hsieh B. Security analysis of Shim’s authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2003/113, 2003. Available at http://eprint.iacr.org/2003/113.
Ryu E K, Yoon E J, Yoo Y Y. An efficient ID-based authenticated key agreement protocol from pairings. In: Proc of NETWORKING 2004, LNCS vol. 3042. New York: Springer-Verlag, 2004. 1458–1463
Wang S, Cao Z, Bao H. Security of an efficient ID-based authenticated key agreement protocol from pairings. In: Proc of ISPA’05 Workshops, LNCS vol. 3759. New York: Springer-Verlag, 2005. 342–349
Wang S, Cao Z, Choo K -K R, et al. An improved identitybased key agreement protocol and its security proof. Inf Sci, 2009, 179(3): 307–318
McCullagh N, Barreto P S L M. A new two-party identitybased authenticated key agreement. In: Proc of CT-RSA 2005, LNCS vol. 3376. New York: Springer-Verlag, 2005. 262–274
Xie G. Cryptanalysis of Noel McCullagh and Paulo S. L. M.Barreto’s two-party identity-based key agreement. Cryptology ePrint Archive, Report 2004/308, 2004. Available at http://eprint.iacr.org/2004/308.
McCullagh N, Barreto P S L M. A new two-party identity-based authenticated key agreement. Cryptology ePrint Archive, Report 2004/122, 2004. Available at http://eprint.iacr.org/2004/122. (Updated paper of [11].)
Xie G. An ID-based key agreement scheme from pairing. Cryptology ePrint Archive, Report 2005/093, 2005. Available at http://eprint.iacr.org/2005/093
Li S, Yuan Q, Li J. Towards security two-part authenticated key agreement protocols. Cryptology ePrint Archive, Report 2005/300, 2005. Available at http://eprint.iacr.org/2005/300
Wang Y. Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/108, 2005. Available at http://eprint.iacr.org/2005/108
Yuan Q, Li S. A new efficient ID-based authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/309, 2005. Available at http://eprint.iacr.org/2005/309
Cheng Z, Chen L, Comley R, Tang Q. Identity-based key agreement with unilateral identity privacy using pairings. In: Proc of ISPEC 2006, LNCS vol. 3903. New York: Springer-Verlag, 2006. 202–213
Choo K -K R, Boyd C, Hitchcock Y. Errors in computational complexity proofs for protocols. In: Proc of ASIACRYPT 2005, LNCS vol. 3788. New York: Springer-Verlag, 2005. 624–643
Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Proc of EUROCRYPT’ 01, LNCS vol. 2045. New York: Springer-Verlag, 2001. 453–474
Choo K-K R. Key Establishment: proofs and refutations. Ph.D. Thesis. Brisbane: Queensland University of Technology. (Available at http://adt.library.qut.edu.au/adtqut/public/adt-QUT20060928.114022.)
Kudla C. Special signature schemes and key agreement protocols. PhD Thesis, Royal Holloway University of London, 2006
Kudla C, Paterson K G. Modular security proofs for key agreement protocols. In: Proc of ASIACRYPT’05, LNCS vol. 3788. New York: Springer-Verlag, 2005. 549–565
Okamoto T, Pointcheval D. The Gap-problems: a new class of problems for the security of cryptographic schemes. In: Proc of PKC 2001, LNCS vol. 1992. New York: Springer-Verlag, 2002. 104–118
Bellare M, Rogaway P. Entity authentication and key distribution. In: Proc of CRYPTO 1993, LNCS vol. 773. New York: Springer-Verlag, 1993. 110–125
Barreto P S L M, Kim K Y, Lynn B. Efficient algorithms for pairing-based cryptosystems. In: Proc CRYPTO 2002, LNCS vol. 2442. New York: Springer-Verlag, 2002. 354–368
Galbraith S D, Harrison K, Soldera D. Implementing the Tate pairing. In: Proc of ANTS-V, LNCS vol. 2369. New York: Springer-Verlag, 2002. 324–337
Blake-Wilson S, Johnson C, Menezes A. Key agreement protocols and their security analysis. In: Proc of the sixth IMA International Conference on Cryptography and Coding, LNCS vol. 1355. New York: Springer-Verlag, 1997. 30–45
Choo K -K R, Boyd C, Hitchcock Y, et al. On session identifiers in provably secure protocols: The Bellare-Rogaway threeparty key distribution protocol revisited. In: Proc of SCN 2004, LNCS vol. 3352. New York: Springer-Verlag, 2005. 351–366
Cheng Z, Nistazakis M, Comley R, et al. On the indistinguishability-based security model of key agreement protocols—simple cases. In: Proc of ACNS 2004 (technical track). (The full paper available on Cryptology ePrint Archive, Report 2005/129)
Krawczyk H. HMQV: A high performance secure Diffie-Hellman protocol. In: Proc of Crypto 2005, LNCS vol. 3621. New York: Springer-Verlag, 2005. 546–566
Sakai R, Ohgishi K, Kasahara M. Cryptosystems based on pairing. In: Proc of the 2000 Symposium on Cryptography and Information Security. Okinawa, Japan, 2000
Cheng Z, Chen L. On security proof of McCullagh-Barreto’s key agreement protocol and its variants. Int J Secur Netw, 2007, 2(3/4): 251–259
Diffie W, Hellman M E. New directions in cryptography. IEEE Trans Inf Theory, 1976, 22(6): 644–654
Author information
Authors and Affiliations
Corresponding author
Additional information
The views and opinions expressed in this article are those of the author and should not be taken to represent, in whole or in part, the views of the Australian Government, the Australian Institute of Criminology, and the Australian National University. Research was undertaken in the author’s personal capacity.
Supported in part by the National High-Tech Research & Development Program of China (Grant No. 2006AA01Z424), the National Natural Science Foundation of China (Grant Nos. 60673079, 60773086), and the National Basic Research Program of China (Grant No. 2007CB311201)
Rights and permissions
About this article
Cite this article
Wang, S., Cao, Z., Cheng, Z. et al. Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode. Sci. China Ser. F-Inf. Sci. 52, 1358–1370 (2009). https://doi.org/10.1007/s11432-009-0135-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11432-009-0135-4