Security

Efficient Identity-Based and Authenticated Key Agreement Protocol

Free registration required

Executive Summary

Several identity based and implicitly authenticated key agreement protocols have been proposed in recent years and none of them has achieved all required security properties. It remains an open question to design secure identity based and implicitly authenticated key agreement protocols. In this paper, the authors propose an efficient identity-based and authenticated key agreement protocol IDAK using Weil/Tate pairing. The security of IDAK is proved in Bellare-Rogaway model. Several required properties for key agreement protocols are not implied by the Bellare-Rogaway model. They proved these properties for IDAK separately.

  • Format: PDF
  • Size: 334.65 KB