Browse > Article
http://dx.doi.org/10.13089/JKIISC.2005.15.4.11

Authenticated Identity-based Key Agreement Protocols in a Multiple Independent PKG Environment  

Lee Hoonjung (Hanyang University)
Kim Hyunsook (Hanyang University)
Kim Sangjin (Korea University of Technology and Education)
Oh Heekuck (Hanyang University)
Abstract
To date, most identity-based key agreement protocols are based on a single PKG (Private Key Generator) environment. In 2002, Chen and Kudla proposed an identity-based key agreement protocol for a multiple PKG environment, where each PKG shares identical system parameters but possesses distinct master key. However, it is more realistic to assume that each PKG uses different system parameters including the PKG's master key. In this paper, we propose a new two party key agreement protocol between users belonging to different PKGs that do not share system parameters. We also extend this protocol to two types of tripartite key agreement protocols. We show that our two party protocol requires minimal amount of pairing computation for a multiple PKG environment and our tripartite protocol is more efficient than existing protocols. We also show that the proposed key agreement protocols satisfy every security requirements of key agreement protocol.
Keywords
ID-based cryptosystem; bilinear map; key agreement protocol; multiple independent PKG;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Chen and C. Kudla, 'Identity- based Authenticated Key Agreement Protocols from Pairings,' Cryptology ePrint Archive, Reoprt 2002/184, 2004
2 F. Zhang, S. Liu, K. Kim, 'ID-Based One Round Authenticated Tripartite Key Agreement Protocols with Pairings,' Crypology ePrint Archive, Report 2002/122, 2002
3 박영호, 이경현, '효율성을 개선한 신원기반의 3자간 복수 키 합의 프로토콜', 한국정보보호학회논문지 제15권 제3호, pp. 77-89, 2005
4 D. Boneh and M. Franklin, 'Identity- based Encryption from Weil Pairing,' CRYPTO '01, LNCS Volume 2139, pp. 213-229, Springer-Verlag, 2001
5 김동현, 김상진, 오희국, 구본석, 유권호, '동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델', 한국정보보호학회 논문지 제15권 제2호, pp. 23-37, 2005
6 W. Diffie and M. Hellman, 'New Direction in Cryptography,' In IEEE Transaction of Information Theory, Volume 22, pp. 664-654, 1976
7 N. McCullagh, and P. Barreto, 'A New Two-Party Identity-Based Authenticated Key Agreement,' Cryptology ePrint Archive, Report 2004/122, 2004
8 A. Joux, 'A One Round Protocol for Tripartite Diffie-Hellman,' ANTS-IV, LNCS Volume 1838, pp. 385-394, Spinger-Verlag, 2000
9 D. Nalla and K. Reddy, 'ID-Based tripartite Authenticated Key Agreement Protocols from Pairings,' Cryptology ePrint Archive, Report 2003/ 04, 2003
10 이성운, 유기영, '간단하고 효율적인 상호 인증키 동의 프로토콜', 한국정보보호학회논문지 제13권 제1호, pp. 105-113, 2003
11 S. S. Al-Riyami and K. G. Patterson, 'Tripartite Authenticated Key Agreement Protocols from Pairings,' In IMA Conference on Cryptography and Coding, LNCS Volume 2898, pp. 332- 359, Spinger-Verlag, 2003
12 박영호, 박호상, 정수환, 'ECDSA를 적용한 ID 기반의 사용자 인증 및 키 교환 프로토콜', 한국정보보호학회논문지 제12권 제1호, pp. 3-10, 2002
13 Z. Chen, 'Security Analysis on Nalla- Reddy's ID-Based Tripartite Key Agreement Protocols,' Cryptology ePrint Archive, Report 2003/103, 2003
14 A. Menezes, T. Okamoto, and S. Vanstone, 'Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field,' In IEEE Transaction of Information Theory, Volume 39, pp. 1639-1646, 1993   DOI   ScienceOn
15 G. Gunther, 'An Identity-based Key exchange Protocol,' EUROCRYPT '89, LNCS Volume 434, pp. 29-37, Springer -Verlag, 1990
16 H. Sakazaki, E. Okamoto, and M. Mambo, 'Constructing Identity-based Key Distribution Systems over Elliptic Curves,' IEICE TRANS. Fundamentals, Volume E81-A, pp. 2138-2143, 1998
17 G. Frey and H. Ruck, 'A Remark Concerning m-divisibility and The Discrete Logarithm in the Divisor class Group of Curves,' Mathematics of Computation, Volume 62, pp. 865- 874, 1994   DOI   ScienceOn
18 A. Shamir, 'Identity-based Cryptosystems and Signature Scheme,' CRYPTO '84, LNCS Volume 196, pp. 47-53, Springer-Verlag, 1984
19 N. Smart, 'An Identity-based Authenticated Key Agreement Protocol Based on Weil Pairing,' In Electronic Letters, Volume 38, pp.630-632, 2002   DOI   ScienceOn
20 L. Chen and C. Kudla, 'Identity- based Authenticated Key Agreement Protocols from Pairings,' In Proceedings of the 16th IEEE Computer Security Foundations Workshop, pp. 219-233, IEEE Computer Society Press, 2003
21 R. Dutta, R. Barua, P. Sarkar, 'Pairing-Based Cryptography : A Survey,' Cryptology ePrint Archive, Report 2004/064. 2004
22 K. Shim, 'Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols,' Cryptology ePrint Archive, Report 2003/115, 2003
23 A. Menezes, M. Qu, and S. Vanstone, 'Some New Key Agreement Protocols Providing Mutual Implicit Authentications,' 2nd Workshop on Selected Areas in Cryptography (SAC '95), pp. 22-32, 1995