Identity-Based Key Exchange Protocols without Pairings
This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known. The novelty of our...
Saved in:
| Published in | Transactions on Computational Science X Vol. 6340; pp. 42 - 77 |
|---|---|
| Main Authors | , |
| Format | Book Chapter |
| Language | English |
| Published |
Germany
Springer Berlin / Heidelberg
01.01.2010
Springer Berlin Heidelberg |
| Series | Lecture Notes in Computer Science |
| Subjects | |
| Online Access | Get full text |
| ISBN | 9783642174988 3642174981 |
| ISSN | 0302-9743 1866-4741 |
| DOI | 10.1007/978-3-642-17499-5_3 |
Cover
| Abstract | This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known.
The novelty of our protocol is that it can be implemented over any cyclic group of prime order, where the Diffie-Hellman problem is supposed to be hard. It does not require the computation of expensive bilinear maps, or additional assumptions such as factoring or RSA.
The protocol is extremely efficient, requiring only twice the amount of bandwidth and computation of the unauthenticated basic Diffie-Hellman protocol. The design of our protocol was inspired by MQV (the most efficient authenticated Diffie-Hellman based protocol in the public-key model) and indeed its performance is competitive with respect to MQV (especially when one includes the transmission and verification of certificates in the MQV protocol, which are not required in an id-based scheme). Our protocol requires a single round of communication in which each party sends only 2 group elements: a very short message, especially when the protocol is implemented over elliptic curves.
We provide a full proof of security in the Canetti-Krawczyk security model for key exchange, including a proof that our protocol satisfies additional security properties such as forward secrecy, and resistance to reflection and key-compromise impersonation attacks. |
|---|---|
| AbstractList | This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known.
The novelty of our protocol is that it can be implemented over any cyclic group of prime order, where the Diffie-Hellman problem is supposed to be hard. It does not require the computation of expensive bilinear maps, or additional assumptions such as factoring or RSA.
The protocol is extremely efficient, requiring only twice the amount of bandwidth and computation of the unauthenticated basic Diffie-Hellman protocol. The design of our protocol was inspired by MQV (the most efficient authenticated Diffie-Hellman based protocol in the public-key model) and indeed its performance is competitive with respect to MQV (especially when one includes the transmission and verification of certificates in the MQV protocol, which are not required in an id-based scheme). Our protocol requires a single round of communication in which each party sends only 2 group elements: a very short message, especially when the protocol is implemented over elliptic curves.
We provide a full proof of security in the Canetti-Krawczyk security model for key exchange, including a proof that our protocol satisfies additional security properties such as forward secrecy, and resistance to reflection and key-compromise impersonation attacks. |
| Author | Fiore, Dario Gennaro, Rosario |
| Author_xml | – sequence: 1 givenname: Dario surname: Fiore fullname: Fiore, Dario email: dario.fiore@ens.fr organization: CNRS - INRIA, École Normale Supérieure, Paris – sequence: 2 givenname: Rosario surname: Gennaro fullname: Gennaro, Rosario email: rosario@us.ibm.com organization: IBM T.J. Watson Research Center, Hawthorne |
| BookMark | eNo1kMtOwzAQRQ0URFr6BWzyAwa_4scSqgIVlegCJHaW49htoEpC7Ar69zgtzGY0jzujc8dg1LSNA-AaoxuMkLhVQkIKOSMQC6YULDQ9AWOaGof6_RRkWHIOmWD4DEzT-v9MyhHIEEUEKsHoBci4EkRRTuUlmIbwgVIwwYUsMsAXlWtiHffw3gRX5c9un89_7MY0a5ev-ja2tt2G_LuOm3YX85Wp-7pZhytw7s02uOlfnoC3h_nr7AkuXx4Xs7sl7AhDETpvSklKybzy1hphrCq9YhX2THFBC1Ey7iTBVljrvCXKl6WonFOSGuZUQScAH--Gbvjrel227WfQGOnBJJ2oNdWJWx9M0cmkpCFHTde3XzsXonaDyCbO3mwTWhddHzRFnBOKh1OFoL_NtWf7 |
| ContentType | Book Chapter |
| Copyright | Springer-Verlag Berlin Heidelberg 2010 |
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 |
| DBID | FFUUA |
| DOI | 10.1007/978-3-642-17499-5_3 |
| DatabaseName | ProQuest Ebook Central - Book Chapters - Demo use only |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science |
| EISBN | 364217499X 9783642174995 |
| EISSN | 1866-4741 |
| Editor | Tan, C. J. Kenneth Gavrilova, Marina L |
| Editor_xml | – sequence: 1 fullname: Gavrilova, Marina L – sequence: 3 fullname: Tan, C. J. Kenneth |
| EndPage | 77 |
| ExternalDocumentID | EBC3066231_10_57 |
| GroupedDBID | 089 0D6 0DA 0E8 2HV 38. 4UP 4V3 A4J AABBV AAJYQ AATVQ ABBUY ABBVZ ABCYT ABMKK ABMNI ACDPG ACDTA ACDUY ACZTO AEDXK AEHEY AEJLV AEKFX AEOKE AETDV AEZAY AHNNE AHSMR ALMA_UNASSIGNED_HOLDINGS ATJMZ AZZ BBABE CZZ FFUUA I4C IEZ IW0 JJU MW~ MYL SBO TBMHI TPJZQ TSXQS Z5O Z7R Z7S Z7U Z7V Z7W Z7X Z7Y Z7Z Z81 Z83 Z84 Z85 Z87 Z88 -DT -GH -~X 1SB 29L 2HA 5QI 875 AASHB ACGFS ADCXD AEFIE EJD F5P FEDTE HVGLF LAS LDH P2P RNI RSU SVGTG VI1 ~02 |
| ID | FETCH-LOGICAL-p240t-efab82b84f9fcca7ac9bf94d1f4967357b46e821c7ccefc29fbb7dee983a4e953 |
| ISBN | 9783642174988 3642174981 |
| ISSN | 0302-9743 |
| IngestDate | Wed Sep 17 03:58:08 EDT 2025 Tue Oct 21 00:15:51 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| LCCallNum | TK5105.5-5105.9 |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-p240t-efab82b84f9fcca7ac9bf94d1f4967357b46e821c7ccefc29fbb7dee983a4e953 |
| Notes | An extended abstract of this paper appears in the proceedings of CT-RSA 2010 [18]. |
| OCLC | 697293638 |
| PQID | EBC3066231_10_57 |
| PageCount | 36 |
| ParticipantIDs | springer_books_10_1007_978_3_642_17499_5_3 proquest_ebookcentralchapters_3066231_10_57 |
| PublicationCentury | 2000 |
| PublicationDate | 2010-01-01 |
| PublicationDateYYYYMMDD | 2010-01-01 |
| PublicationDate_xml | – month: 01 year: 2010 text: 2010-01-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Germany |
| PublicationPlace_xml | – name: Germany – name: Berlin, Heidelberg |
| PublicationSeriesTitle | Lecture Notes in Computer Science |
| PublicationSubtitle | Special Issue on Security in Computing, Part I |
| PublicationTitle | Transactions on Computational Science X |
| PublicationYear | 2010 |
| Publisher | Springer Berlin / Heidelberg Springer Berlin Heidelberg |
| Publisher_xml | – name: Springer Berlin / Heidelberg – name: Springer Berlin Heidelberg |
| RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David Tygar, Doug |
| RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany |
| SSID | ssj0000476785 ssj0002792 |
| Score | 1.8732775 |
| Snippet | This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity... |
| SourceID | springer proquest |
| SourceType | Publisher |
| StartPage | 42 |
| SubjectTerms | Forward Secrecy Public Parameter Random Exponent Random Oracle Uncorrupted Party |
| Title | Identity-Based Key Exchange Protocols without Pairings |
| URI | http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066231&ppg=57 http://link.springer.com/10.1007/978-3-642-17499-5_3 |
| Volume | 6340 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbocgEOhQKiFFAOnFgZNbHjx4FDC4uqUlUItWhvVuzYUi8b1A1Sy69n_EqyC0Iql2iVRGt7PmfsGc83g9Bbb281zDgsKbWYVobDJwU2j61hea5anyE9BMies5NLerqsl2NV1MAu6fV78-uvvJL_QRXuAa6eJXsHZIc_hRvwG_CFKyAM163N76abdVxlIi0huPxjfYbs28vf7HIA6CpF1H4C67gbwm5AzzaR6vKtW49PUnx7ZPHe4mNY69r5F9Afi5tIFfYMg76DWRTpcT66-WtzdT343f347frDWTqiOO_6EPk1z1UkcgenXocQvDb1OmSv4_wfSbkCQYR6k0eKiYoFrVJhsGKiWrNR7QrGMOUxBVZSpTHpVlqUY6mXP9T9NMIDmsK-LYlrRXbQDrQ-Q_ePFqdn3wen2yHljE_sI589MR4zxS558k_uchnTM41DGHJWxbTEWy1uWChbh-phr3LxGD3y_JXCE0tAzk_QPbvaQ7tZ7kWS-x56OElF-RSxTawLwLrIWBcD1kXCushYP0OXnxcXH09wqqmBf8DercfWNVpUWlAnHXy8vDFSO0nb0lHJOKm5psyKqjTcGOtMJZ3WvLVWCtJQK2vyHM1W3cq-QEXLwLYQohYWjHInDzVxJTFNAxY4L2lb7aN5logKJ_8p3NjE8a8V8dUHSKnADq35PnqXhab8y2uVE2qDsBVRIGwVhK1A2C_v8vIBejDO4Fdo1l__tK9hJ9nrN2l-_AZKHWsq |
| linkProvider | Library Specific Holdings |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Transactions+on+Computational+Science+X&rft.au=Fiore%2C+Dario&rft.au=Gennaro%2C+Rosario&rft.atitle=Identity-Based+Key+Exchange+Protocols+without+Pairings&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642174988&rft.issn=0302-9743&rft.eissn=1866-4741&rft.spage=42&rft.epage=77&rft_id=info:doi/10.1007%2F978-3-642-17499-5_3 |
| thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066231-l.jpg |