Integrating identity-based and certificate-based authenticated key exchange protocols

Springer Science and Business Media LLC - Tập 10 Số 4 - Trang 201-212 - 2011
Berkant Ustaoğlu1
1NTT Information Sharing Platform Laboratories, Tokyo, Japan

Tóm tắt

Từ khóa


Tài liệu tham khảo

Blake-Wilson, S., Johnson, D., Menezes, A.: Key agreement protocols and their security analysis. In: Darnell, M. (ed.) 6th IMA International Conference, vol. 1355 of LNCS, pp. 30–45. Springer, Berlin (1997)

Boyd C., Choo K.-K.R.: Security of two-party identity-based key agreement. In: Dawson, E., Vaudenay, S. (eds) Progress in Cryptology—Mycrypt 2005, vol. 3715 of LNCS, pp. 229–243. Springer, Berlin (2005)

Boyd C., Cliff Y., González Nieto J.M., Paterson K.G.: Efficient one-round key exchange in the standard model. In: Mu, Y., Susilo, W., Seberry, J. (eds) Information Security and Privacy—ACISP 2008, vol. 5107 of LNCS, pp. 69–83. Springer, Berlin (2008)

Canetti R., Krawczyk H.: Analysis of key-exchange protocols and their use for building secure channels. In: Pfitzmann, B. (eds) Advances in Cryptology—EUROCRYPT 2001, vol. 2045 of LNCS, pp. 453–474. Springer, Berlin (2001)

Canetti R., Krawczyk H.: Security analysis of IKE’s signature-based key-exchange protocol. In: Yung, M. (eds) Advances in Cryptology—CRYPTO 2002, vol. 2442 of LNCS, pp. 143–161. Springer, Berlin (2002)

Chatterjee S., Menezes A., Ustaoğlu B.: Reusing static keys in key agreement protocols. In: Roy, B., Sendrier, N. (eds) Progress in Cryptology—INDOCRYPT 2009, vol. 5922 of LNCS, pp. 39–56. Springer, Berlin (2009)

Chen L., Cheng Z., Smart N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Security 6(4), 213–241 (2007)

Chen, L., Kudla, C.: Identity based authenticated key agreement protocols from pairings. In: Proceedings of 16th IEEE Computer Security Foundations Workshop, pp. 219–233 (2003)

Choo K.-K.R., Chow S.S.M.: Strongly-secure identity-based key agreement and anonymous extension. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds) Information Security—ISC 2008, vol. 4779 of LNCS, pp. 203–220. Springer, Berlin (2007)

Diffie W., Hellman M.E.: New directions in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)

ElGamal T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT-31(4), 469–472 (1985)

Fujioka, A., Suzuki, K., Ustaoğlu, B.: Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols. Cryptology ePrint Archive, Report 2009/423 (2009)

Günther C.G.: An identity-based key-exchange protocol. In: Vandewaile, J., Quisquater, J.-J. (eds) Advances in Cryptology—EUROCRYPT’89, vol. 434 of LNCS, pp. 29–37. Springer, Berlin (1989)

Huang, H., Cao, Z.: An ID-based authenticated key exchange protocol based on bilinear Diffie–Hellman problem. In: Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS ’09: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, pp. 333–342. ACM (2009)

Kelsey J., Schneier B., Wagner D.: Protocol interactions and the chosen protocol attack. In: Christianson, B., Crispo, B., Lomas, M., Michael, R. (eds) Security Protocols—5th International Workshop, vol. 1361 of LNCS, pp. 91–104. Springer, Berlin (1998)

Krawczyk H.: HMQV: a high-performance secure Diffie–Hellman protocol. In: Cramer, R. (eds) Advances in Cryptology—CRYPTO 2005, vol. 3621 of LNCS, pp. 546–566. Springer, Berlin (2005)

LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) Provable Security: First International Conference, ProvSec 2007, vol. 4784 of LNCS, pp. 1–16. Springer, Berlin (2007)

Law L., Menezes A., Qu M., Solinas J., Vanstone S.A.: An efficient protocol for authenticated key agreement. Des. Codes Cryptogr. 28(2), 119–134 (2003)

McCullagh N., Barreto P.S.L.M.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (eds) Topics in Cryptology—CT-RSA 2005, vol. 3376 of LNCS, pp. 262–274. Springer, Berlin (2005)

Okamoto E., Tanaka K.: Key distribution system based on identification information. IEEE J. Sel. Areas Commun. 7(4), 481–485 (1989)

Rivest R.L., Shamir A., Adleman L.M.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

Shamir A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds) Advances in Cryptology—CRYPTO 84, vol. 196 of LNCS, pp. 47–53. Springer, Berlin (1984)

Smart N.P.: Identity-based authenticated key agreement protocol based on weil pairing. IET Electron. Lett. 38(13), 630–632 (2002)

Ustaoğlu, B.: Comparing SessionStateReveal and EphemeralKeyReveal for Diffie–Hellman protocols. In: Pieprzyk, J., Zhang, F. (eds.) Provable Security: Third International Conference, ProvSec 2009, vol. 5848 of LNCS, pp. 183–197. Springer, Berlin (2009)

Wang, Y.: Efficient identity-based and authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/108 (2005)

Xie, G.: An ID-based key agreement scheme from pairing. Cryptology ePrint Archive, Report 2005/093 (2005)

Yuan, Q., Li, S.: A new efficient ID-based authenticated key agreement protocol. Cryptology ePrint Archive, Report 2005/309 (2005)