Strongly Secure Identity-Based Key Exchange With Single Pairing Operation

COMPUTER SECURITY - ESORICS 2019, PT II(2019)

引用 6|浏览8
暂无评分
摘要
This paper proposes an id-eCK secure identity-based authenticated key exchange (ID-AKE) scheme, where the id-eCK security implies that a scheme resists against leakage of all combinations of master, static, and ephemeral secret keys except ones trivially break the security. Most existing id-eCK secure ID-AKE schemes require two symmetric pairing operations or a greater number of asymmetric pairing, which is faster than symmetric one, operations to establish a session key. However, our scheme is realized with a single asymmetric pairing operation for each party, and this is an advantage in efficiency.The proposed scheme is based on the ID-AKE scheme by McCullagh and Barreto, which is vulnerable to an active attack. To achieve id-eCK security, we apply the HMQV construction and the NAXOS technique to the McCullagh-Barreto scheme. The id-eCK security is proved under the external Diffie-Hellman for target group assumption and the q-gapbilinear collision attack assumption.
更多
查看译文
关键词
Identity-based authenticated group key exchange, id-eCK security, Asymmetric pairing, External Diffie-Hellman for target group assumption, q-gap-bilinear collision attack assumption, HMQV construction, NAXOS technique
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要