Identity-Based Key Exchange Protocols without Pairings
نویسندگان
چکیده
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly
منابع مشابه
Secure Bilinear Diffie-Hellman Bits
The Weil and Tate pairings are a popular new gadget in cryptography and have found many applications, including identity-based cryptography. In particular, the pairings have been used for key exchange protocols. This paper studies the bit security of keys obtained using protocols based on pairings (that is, we show that obtaining certain bits of the common key is as hard as computing the entire...
متن کاملIdentity-based Key Exchange Protocols for Ad Hoc Networks
In this work we present a set of authentication and key exchange protocols that use identity-based pre-shared keys from pairings. We show that those protocols are attractive for an implementation in ad hoc networks. We start with introducing a light-weight protocol that uses purely symmetric crypto primitives. We then gradually add more security features. We analyze the security and performance...
متن کاملEfficient identity-based authenticated multiple key exchange protocol
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been proposed. However, the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over ...
متن کاملEfficient identity-based authenticated multiple key exchange protocol
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been proposed. However, the relative computation cost of the pairing is approximately twenty times higher than that of the scalar multiplication over ...
متن کاملOne-round identity-based key exchange with Perfect Forward Security
a r t i c l e i n f o a b s t r a c t Identity-based authenticated key exchange (IBAKE) protocol is one of the most important cryptographic primitives that enables two parties using their identities to establish their common secret keys without sending and verifying public key certificates. Recently, many works have been dedicated to design efficient and secure IBAKE protocols without bilinear ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Trans. Computational Science
دوره 10 شماره
صفحات -
تاریخ انتشار 2010