LI Yang, ZHU Jianming, ZHANG Ning, WANG Xiuli, ZHANG Yaoqi. RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol[J]. Chinese Journal of Electronics, 2015, 24(2): 332-337. doi: 10.1049/cje.2015.04.018
Citation: LI Yang, ZHU Jianming, ZHANG Ning, WANG Xiuli, ZHANG Yaoqi. RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol[J]. Chinese Journal of Electronics, 2015, 24(2): 332-337. doi: 10.1049/cje.2015.04.018

RYY++: A Novel Provably Secure Identity-Based Authenticated Key Agreement Protocol

doi: 10.1049/cje.2015.04.018
Funds:  This work is supported by the National Natural Science Foundation of China (No.61272398), National Social Science Foundation of China (No.13AXW010), Foundation of Science and Technology on Information Assurance Laboratory (No.KJ-14-008) and Discipline Construction Foundation of Central University of Finance and Economics.
  • Publish Date: 2015-04-10
  • Based on revisiting the RYY+ Identitybased (ID-Based) key agreement protocol, we find it's vulnerable to Intermediate results leakage (IRL) and Keycompromise impersonation (KCI) attack. A novel protocol called RYY++ is proposed to make up for its deficiencies. Our protocol follows the Full dual exponential challenge response (FDCR-1) scheme to ensure the signature change every time, so the master public key of Private key generator (PKG) joined in signature generation can guarantee two parties trust each other. The RYY++ protocol is also proven to be secure in the Strengthened extended Canetti-Krawczyk (SeCK) model which provides better support for adversary's query and has an advantage over most existing protocols on security and efficiency.
  • loading
  • C. Boyd and A. Mathuria, Protocols for Authentication and Key Establishment, Springer-Verlag, Berlin, Germany, pp.1-32, 2003.
    N.P. Smart, “Identity-based authenticated key agreement protocol based on Weil pairing”, Electronics Letters, Vol.38, No.13, pp.630-632, 2002.
    D. Boneh and M. Franklin,“Identity-based encryption from theWeil pairing”, Proc. of CRYPTO'01, Santa Barbara, California, USA, pp.213-229, 2001.
    L. Chen and C. Kudla. “Identity based authenticated key agreement protocols from pairings”, Proc. of 16th IEEE Computer Security Foundations Workshop, Pacific Grove, California, USA, pp.219-213, 2003.
    E.-K. Ryu, E.-J. Yoon and K.-Y. Yoo, “An efficient ID-based authenticated key agreement protocol from pairings”, Proc. of Networking'04, Athens, Greece, pp.1458-1463, 2004.
    C. Boyd and K.-K.R. Choo, “Security of two-party identitybased key agreement”, Proc. of Mycrypt'05, Kuala Lumpur, Malaysia, pp.229-243, 2005.
    S. Wang, Z. Cao and H. Bao, “Security of an efficient ID-based authenticated key agreement protocol from pairings”, Proc. of ISPA'05 Workshops, Nanjing, China, pp.342-349, 2005.
    S. Wang, Z. Cao, K.-K.R. Choo and L. Wang, “An improved identity-based key agreement protocol and its security proof”, Information Sciences, Vol.179, No.3, pp.307-318, 2009.
    J. Shen, S. Moh and I. Chung, “Identity-based key agreement protocol employing a symmetric balanced incomplete block design”, Journal of Communications and Networks, Vol.14, No.6, pp.682-691, 2012.
    H. Xiong, Z. Chen and F. Li, “New identity-based three-party authenticated key agreement protocol with provable security”, Journal of Network and Computer Applications, Vol.26, No.2, pp.927-932, 2013.
    C. Boyd, Y. Cliff, J.G. Nieto and K.G. Paterson, “Efficient oneround key exchange in the standard model”, Proc. of ACISP'08, Wollongong, Australia, pp.69-83, 2008.
    H. Huang and Z. Cao, “An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem”, Proc. of ASIACCS'09, Sydney, Australia, pp.333-342, 2009.
    L. Chen, Z. Cheng and N.P. Smart, “Identity-based key agreement protocols from pairings”, International Journal of Information Security, Vol.6, No.4, pp.213-242, 2007.
    P. S. Augustin, P. E. Vincent and J. C. Bajard, “A New security model for authenticated key agreement”, Proc. of SCN'10, Amalfi, Italy, pp.219-234, 2010.
    S.S.-M. Chow and K.-K.R. Choo, “Strongly-secure identitybased key agreement and anonymous extension”, Proc. of ISC'07, Valparaíso, Chile, pp.203-220, 2005.
    N. Liang, G. Chen, J. Li and Y. Hao, “Strongly secure identitybased authenticated key agreement protocols”, Computers & Electrical Engineering, Vol.37, No.2, pp.205-217, 2011.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (218) PDF downloads(1077) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return