会议专题

PROVABLY SECURE IDENTITY-BASED AUTHENTICATED KEY AGREEMENT PROTOCOL AND ITS APPLICATION

  We point out the RYY+ identity-based (ID-based) key agreement protocol is vulnerable to Key-compromise impersonation (KCI) attack and Intermediate results leakage (IRL)attack.Then we give the improved protocol which provides KCI and IRL resistance.The novel protocol is provably secure under the gap Bilinear Diffie-Hellman assumption in the seCK model,which enhances the adversarys queries comparing with previous ID based AKE models.The proposed scheme also has an advantage over most previous schemes on security and efficiency.

ID-based Authenticated key exchange Provable security SIP

Shuai Shao Bin Tian Xin Wang Yang Li

China Information Technology Security Evaluation Center,Beijing 100085,China College of Information,Central University of Finance and Economics,Beijing 100081,China

国际会议

2012 2nd IEEE International Conference on Cloud Computing and Intelligence Systems (2012年第2届IEEE云计算与智能系统国际会议(IEEE CCIS2012))

杭州

英文

1693-1697

2012-10-30(万方平台首次上网日期,不代表论文的发表时间)