Browse > Article
http://dx.doi.org/10.13089/JKIISC.2006.16.1.23

ID-based Authenticated Key Agreement for Unbalanced Computing Environment  

Choi Kyu-young (Center for Information Security Technology(CIST), Korea University)
Hwang Jung-yeon (Center for Information Security Technology(CIST), Korea University)
Hong Do-won (Electronics and Telecommunications Research Institute(ETRI))
Lee Dong-hoon (Center for Information Security Technology(CIST), Korea University)
Abstract
Key Agreement protocols are among the most basic and widely used cryptographic protocols. In this paper we present an efficient O-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments : an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. Our protocol uses signcryption and provide security in random oracle model.
Keywords
Key Agreement; ID-based Cryptosystem; Signcryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Bellare, P. Pointcheaval and P. Rogaway, 'Authenticated key exchange secure against dictionary attacks', Proc. of Eurocrypt' 00, LNCS 1807, pp.139-155, Springer-Verlag, 2000
2 M. Bellare and P. Rogaway. 'Provably-Secure Session Key Distribution : The Three Party Case'. Proc. of STOC '95, pp. 57-66
3 W. Diffie and M. Hellman, 'New Directions in Cryptography', IEEE Transactions on Information Theory 22(6), pp.644-654, 1976   DOI
4 S. D. Galbraith, K. Harrison and D. Soldera, 'Implementing the Tate pairing', Proc. of ANTS'02, LNCS 2369, pp.324-337, Springer- Verlag, 2002
5 N. McCullagh and P. S. L. M. Barreto, 'Effcient and Foward-Secure Identity-Based Signcryption'. Cryptology ePrint Archive, Report 2004/117
6 N.P.Smart, 'An Identity based authenticated Key Agreement protocol based on the Weil pairing', Electronics Letters, vol. 38 (13): 630--632, June 2002   DOI   ScienceOn
7 P. S. L. M. Barreto, B. Lynn and M. Scott, 'Efficient implementation of pairing-based cryptosystems.', Journal of Cryptology, pp. 321-334, 2004
8 J. Katz and M. Yung, 'Scalable Protocols for Authenticated Group Key Exchange', Proc. of Crypto 2003, LNCS 2729, pp.110-125, Springer-Verlag, 2003
9 S. Mitsunari, R. Sakai and M. Kasahara, 'A new traitor tracing', Proc. of IEICE Trans. Vol. E85-A, No.2, pp.481-484, 2002
10 M. Bellare and P. Rogaway, 'Entity authentication and key distribution'. Proc. of Crypto '93. pp.232-249
11 D. Boneh and M. Franklin, 'Identity-based encryption from the Weil pairing', Proc. of Crypto '01, LNCS 2139, pp.213-229, Springer- Verlag, 2001
12 A. Shamir, 'Identity Based Crypto-systems and Signature Schemes', Proc. of Crypto 1984, LNCS 0196, Springer-Verlag, 1984
13 N. McCullagh and P. S. L. M. Barreto, 'A New Two-Party Identity-Based Authenticated Key Agreement', Proc. of CT-RSA'05, LNCS 3376, pp.262-274, Springer-Verlag, 2005
14 D. Pointcheval and J. Stern, 'Security arguments for digital signatures and blind signatures', Journal. of Cryptology, Vol. 13, pp.361-396, 2000   DOI   ScienceOn
15 F. Zhang, R. Safavi-Naini and W. Susilo, 'An Efficient Signature Scheme from Bilinear Pairings and Its Applications', Proc. of PKC '04, LNCS 2947, pp.277-290, Springer- Verlag, 2004
16 J. Y. Hwang, S. M. Lee and D. H. Lee, 'Scalable key exchange trans-formation : from two-party to group', Electronics Letters. Vol. 40, No. 12, Jun. 2004
17 D. Nalla and K. C. Reddy, 'ID-based tripartite Authenticated Key Agreement Protocols from pairings', Cryptology ePrint Archive, Report 2003/004
18 H. J. Kim, S. M. Lee and D. H. Lee, 'Constant-Round Authenticated Gourp Key Exchange for Dynamic Groups', Proc. of Asiacrypt 2004, LNCS 3329, PP.245-259, Springer-Verlag, 2004
19 E. Bresson, O. Chevassut, A. Essiari and D. Pointcheval, 'Mutual Athentication and Group Key Agreement for Low-Power Mobile Devices', In the 5th IEEE International Conference on Mobile and Wireless Communications Networks, 2003
20 K. Y. Choi, J. Y. Hwang and D. H. Lee, 'Efficient ID-based Group Key Agreement with Bilinear Maps', Proc. of PKC '04, LNCS 2947, PP. 130-144, Springer-Verlag, 2004
21 P. S. L. M. Barreto, H. Y. Kim, B. Lynn and M. Scott, 'Efficient algorithms for pairing-based cryptosysterns'. Proc. of Crypto '02, LNCS 2442, pp. 354-368, Springer-Verlag, 2002
22 J. Nam, S. Kim and D. Won, 'Attacks on Bresson-Chevassut-Essiari-Pointchevals Group Key Agreement Scheme for Low-Power Mobile Devices', Proc. of IEEE Communications Letters, 2005
23 Q. Huang, J. Cukier, H. Kobayashi, B. Liu and J. Zhang, 'Fast Authenticated Key Establishment Protocols for Self-Organizing Sensor Networks', In Proc. of WSNA '03, Copyright 2003 ACM