12 research outputs found
On the Relations Between Diffie-Hellman and ID-Based Key Agreement from Pairings
This paper studies the relationships between the traditional Diffie-Hellman
key agreement protocol and the identity-based (ID-based) key agreement protocol
from pairings.
For the Sakai-Ohgishi-Kasahara (SOK) ID-based key construction, we show that
identical to the Diffie-Hellman protocol, the SOK key agreement protocol also
has three variants, namely \emph{ephemeral}, \emph{semi-static} and
\emph{static} versions. Upon this, we build solid relations between
authenticated Diffie-Hellman (Auth-DH) protocols and ID-based authenticated key
agreement (IB-AK) protocols, whereby we present two \emph{substitution rules}
for this two types of protocols. The rules enable a conversion between the two
types of protocols. In particular, we obtain the \emph{real} ID-based version
of the well-known MQV (and HMQV) protocol.
Similarly, for the Sakai-Kasahara (SK) key construction, we show that the key
transport protocol underlining the SK ID-based encryption scheme (which we call
the "SK protocol") has its non-ID counterpart, namely the Hughes protocol.
Based on this observation, we establish relations between corresponding
ID-based and non-ID-based protocols. In particular, we propose a highly
enhanced version of the McCullagh-Barreto protocol
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
Recently, a number of ID-based two-party
authenticated key agreement protocols which make of bilinear
pairings have been proposed \cite {CJL,MB,Sh,S,X}. In this paper, we
show that the Xie\u27s protocol \cite {X} does not provide implicit key
authentication and key-compromise impersonation resilience. Also, we
point out the vulnerability of the Choi {\it et al}\u27s protocol \cite
{CJL} against signature forgery attacks
A New Efficient ID-Based Authenticated Key Agreement Protocol
Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed
an efficient ID-based authenticated key agreement with
paring.They argued that it is secure and efficient. In
this paper, we show this protocol is doesn\u27t satisfy the
Key-Compromise Impersonate property and it is not secure against
key reveal attack. Then we propose our protocol from this protocol
and shim\u27s protocol, its security and efficiency was analyzed
Authenticated and Key Agreement Protocols Based on Certificateless in P2P Network
目前P2P网络得到了迅猛发展,但由于其本身的结构特点使之面临很多的安全问题。网络安全极大地阻碍了P2P系统的发展。文中在比较传统公钥基础设施(PkI),基于身份的公钥密码系统(Id-PkC)和无证书公钥密码系统(Cl-PkC)各自优缺点的基础上,提出了混合P2P中一种基于Cl-PkC的域内和跨域双向认证和密钥协商协议,并进行了安全性分析。本方案克服了P2P网络中PkI繁琐的证书管理和Id-PkC的密钥托管等问题,提高了双向认证和密钥协商的速度,具有较高的效率,能较好地解决混合P2P网络的安全问题。Now P2P network has been rapidly developed,but it faces a lot of security problems because of the structural characteristics.Network security has greatly hampered the development of P2P systems.Based on the respective analysis of the advantages and disadvantages of the traditional public key infrastructure(PKI),identity-based cryptography(ID-PKC) and certificateless public key cryptography(CL-PKC),proposes one kind of bidirectional authenticated and key agreement protocols in one domain and across multiple domains based on CL-PKC for hybrid P2P network.At last analyses its security.The scheme overcomes the problem of complicated management of PKI certificates and the key escrow of ID-PKC in P2P network.It speeds up the time of bidirectional authenticated and key agreement protocols,proved to be more efficient,and can better solve the security problems in hybrid P2P network.福建省自然科学基金项目(A0410004);厦门大学院士基金(0630-E23011);厦门大学新世纪优秀人才支持基金(0000-X07116
A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols
We describe a mechanical approach to derive identity-based (ID-based) protocols from existing Diffie-Hellman-based ones. As case studies, we present the ID-based versions of the Unified Model protocol, UMP-ID, Blake-Wilson, Johnson & Menezes (1997)\u27s protocol, BJM-ID, and Krawczyk (2005)\u27s HMQV protocol, HMQV-ID. We describe the calculations required to be modified in existing proofs. We conclude with a comparative security and efficiency of the three proposed ID-based protocols (relative to other similar published protocols) and demonstrate that our proposed ID-based protocols are computationally efficient
Overview of Key Agreement Protocols
The emphasis of this paper is to focus on key agreement.
To this aim, we address a self-contained, up-to-date presentation of key agreement protocols at high level.
We have attempted to provide a brief but fairly complete survey of all these schemes
Identity-based Key Agreement Protocols From Pairings
In recent years, a large number of identity-based key agreement
protocols from pairings have been proposed. Some of them are
elegant and practical. However, the security of this type of
protocols has been surprisingly hard to prove. The main issue is
that a simulator is not able to deal with reveal queries, because
it requires solving either a computational problem or a decisional
problem, both of which are generally believed to be hard (i.e.,
computationally infeasible). The best solution of security proof
published so far uses the gap assumption, which means assuming
that the existence of a decisional oracle does not change the
hardness of the corresponding computational problem. The
disadvantage of using this solution to prove the security for this
type of protocols is that such decisional oracles, on which the
security proof relies, cannot be performed by any polynomial time
algorithm in the real world, because of the hardness of the
decisional problem. In this paper we present a method
incorporating a built-in decisional function in this type of
protocols. The function transfers a hard decisional problem in the
proof to an easy decisional problem. We then discuss the resulting
efficiency of the schemes and the relevant security reductions in
the context of different pairings one can use. We pay particular
attention, unlike most other papers in the area, to the issues
which arise when using asymmetric pairings
Pairing-based cryptosystems and key agreement protocols.
For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curve cryptography. Only recently after some pioneering works, particularly the well-known Boneh-Franklin identity-based encryption (IBE), pairings have quickly become an important
tool to construct novel cryptographic schemes.
In this thesis, several new cryptographic schemes with pairings are proposed, which are both efficient and secure with respect to a properly defined security model, and some
relevant previous schemes are revisited.
IBE provides a public key encryption mechanism where a public key can be an arbitrary string such as an entity identifier and unwieldy certificates are unnecessary. Based on the Sakai-Kasahara key construction, an IBE scheme which is secure in the Boneh-Franklin IBE model is constructed, and two identity-based key encapsulation mechanisms are proposed. These schemes achieve the best efficiency among the existing schemes to date. Recently Al-Riyami and Paterson introduced the certificateless public key encryption (CL-PKE) paradigm, which eliminates the need of certificates and at the same time retains the desirable properties of IBE without the key escrow problem. The security formulation of CL-PKE is revisited and a strong security model for this type of mechanism is defined.
Following a heuristic approach, three efficient CL-PKE schemes which are secure in the defined strong security model are proposed. Identity-based two-party key agreement protocols from pairings are also investigated.
The Bellare-Rogaway key agreement model is enhanced and within the model several previously unproven protocols in the literature are formally analysed. In considering that the user identity may be sensitive information in many environments, an identity-based key agreement protocol with unilateral identity privacy is proposed