Identity-Based Key Exchange Protocols without Pairings

This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known. The novelty of our...

Full description

Saved in:
Bibliographic Details
Published inTransactions on Computational Science X Vol. 6340; pp. 42 - 77
Main Authors Fiore, Dario, Gennaro, Rosario
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 01.01.2010
Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783642174988
3642174981
ISSN0302-9743
1866-4741
DOI10.1007/978-3-642-17499-5_3

Cover

More Information
Summary:This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known. The novelty of our protocol is that it can be implemented over any cyclic group of prime order, where the Diffie-Hellman problem is supposed to be hard. It does not require the computation of expensive bilinear maps, or additional assumptions such as factoring or RSA. The protocol is extremely efficient, requiring only twice the amount of bandwidth and computation of the unauthenticated basic Diffie-Hellman protocol. The design of our protocol was inspired by MQV (the most efficient authenticated Diffie-Hellman based protocol in the public-key model) and indeed its performance is competitive with respect to MQV (especially when one includes the transmission and verification of certificates in the MQV protocol, which are not required in an id-based scheme). Our protocol requires a single round of communication in which each party sends only 2 group elements: a very short message, especially when the protocol is implemented over elliptic curves. We provide a full proof of security in the Canetti-Krawczyk security model for key exchange, including a proof that our protocol satisfies additional security properties such as forward secrecy, and resistance to reflection and key-compromise impersonation attacks.
Bibliography:An extended abstract of this paper appears in the proceedings of CT-RSA 2010 [18].
ISBN:9783642174988
3642174981
ISSN:0302-9743
1866-4741
DOI:10.1007/978-3-642-17499-5_3