DOI: 10.3724/SP.J.1146.2009.01382

Journal of Electronics & Information Technology (电子与信息学报) 2010/32:10 PP.2393-2399

Provably Secure Identity-based Authenticated Key Agreement Protocols in Multiple PKG Environment

Most available identity-based authenticated key agreement protocols require that both protocol participants are from the same PKG(Private Key Generator) environment. However, safe communication is requisite between protocol participants that are from different PKG environment in practice. In this paper, a new identity-based AKA (Authenticated Key Agreement) protocol is proposed in multiple PKG environment, which makes use of a new technique called twin Diffie-Hellman problem. Moreover, the security of the proposed protocol can be reduced to the standard CDH and BDH assumption in the eCK model, which makes use of the “trapdoor test” technology proposed by Cash et al in Eurocrypt 2008.

Key words:Cryptography,Authenticated Key Agreement (AKA),ID-Based,Bilinear pairing,Multiple Private Key Generator (PKG) environment,Trapdoor test technology

ReleaseDate:2014-07-21 15:29:27

[1] Shamir A. Identity based cryptosystems and signature schemes[C]. CRYPTO’84, Santa Barbara, California, USA, August 19-22, 1984, LNCS 0196: 47-53.

[2] Boneh D and Franklin M. Identity based encryption from the Weil pairing [C]. CRYPTO’01, Santa Barbara, California, USA, August 19-23, 2001, LNCS 2139: 213-229.

[3] Chen L and Kudla C. Identity based authenticated key agreement protocols from pairing[C]. 16th IEEE Security Foundations Workshop, Los Alamitos, CA, USA, June 30-July 2, 2003: 219-233.

[4] McCullagh N and Barreto P S L M. A new two-party identity-based authenticated key agreement[C]. CT-RSA 2005, San Francisco, CA, USA, February 14-18, 2005, LNCS 3376: 262-274.

[5] Cash D, Kiltz E, and Shoup V. The twin diffie-hellman problem and applications[C]. EUROCRYPT2008, Istanbul, Turkey, April 13-17, 2008, LNCS 4965: 127-145.

[6] Huang Hai and Cao Zhen-fu. An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem[C]. ASIACCS 2009, Sydney, Australia, March 10-12, 2009: 363-368.

[7] Canetti R and Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels[C]. EUROCRYPT 2001, Innsbruck, Austria, May 6-10, 2001, LNCS 2045: 453-474.

[8] LaMacchia B, Lauter K, and Mityagin A. Stronger security of authenticated key exchange[C]. ProvSec 2007, Wollongong, Australia, October 31-November 2, 2007, LNCS 4784: 1-16.

[9] Ustaoglu B. Obtaining a secure and effcient key agreement protocol from (H)MQV and NAXOS[J]. Designs, Codes and Cryptography, 2008, 46(3): 329-342.

[10] Chow S S M and Choo K R. Strongly-secure identity-based key agreement and anonymous extension. Information Security, Volume 4779/2007, Springer Berlin Heidelberg, 203-220, 2007. Cryptology ePrint Archive, Report 2007/018. Full version of this paper (2007).