Efficient Identity-Based and Authenticated Key Agreement Protocol
Abstract
Several identity based and implicitly authenticated key agreement protocols have been proposed in recent years and none of them has achieved all required security properties. In this paper, we propose an efficient identity-based and authenticated key agreement protocol IDAK using Weil/Tate pairing. The security of IDAK is proved in Bellare-Rogaway model. Several required properties for key agreement protocols are not implied by the Bellare-Rogaway model. We proved these properties for IDAK separately.
- Publication:
-
arXiv e-prints
- Pub Date:
- July 2012
- DOI:
- 10.48550/arXiv.1207.5438
- arXiv:
- arXiv:1207.5438
- Bibcode:
- 2012arXiv1207.5438W
- Keywords:
-
- Computer Science - Cryptography and Security
- E-Print:
- Transcations on Computational Sciences, 2013