Identity-Based Key Exchange Protocols without Pairings

This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known. The novelty of our...

Full description

Saved in:
Bibliographic Details
Published inTransactions on Computational Science X Vol. 6340; pp. 42 - 77
Main Authors Fiore, Dario, Gennaro, Rosario
Format Book Chapter
LanguageEnglish
Published Germany Springer Berlin / Heidelberg 01.01.2010
Springer Berlin Heidelberg
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783642174988
3642174981
ISSN0302-9743
1866-4741
DOI10.1007/978-3-642-17499-5_3

Cover

Abstract This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known. The novelty of our protocol is that it can be implemented over any cyclic group of prime order, where the Diffie-Hellman problem is supposed to be hard. It does not require the computation of expensive bilinear maps, or additional assumptions such as factoring or RSA. The protocol is extremely efficient, requiring only twice the amount of bandwidth and computation of the unauthenticated basic Diffie-Hellman protocol. The design of our protocol was inspired by MQV (the most efficient authenticated Diffie-Hellman based protocol in the public-key model) and indeed its performance is competitive with respect to MQV (especially when one includes the transmission and verification of certificates in the MQV protocol, which are not required in an id-based scheme). Our protocol requires a single round of communication in which each party sends only 2 group elements: a very short message, especially when the protocol is implemented over elliptic curves. We provide a full proof of security in the Canetti-Krawczyk security model for key exchange, including a proof that our protocol satisfies additional security properties such as forward secrecy, and resistance to reflection and key-compromise impersonation attacks.
AbstractList This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity as public key and receives his secret key from a master Key Generation Center, whose public parameters are publicly known. The novelty of our protocol is that it can be implemented over any cyclic group of prime order, where the Diffie-Hellman problem is supposed to be hard. It does not require the computation of expensive bilinear maps, or additional assumptions such as factoring or RSA. The protocol is extremely efficient, requiring only twice the amount of bandwidth and computation of the unauthenticated basic Diffie-Hellman protocol. The design of our protocol was inspired by MQV (the most efficient authenticated Diffie-Hellman based protocol in the public-key model) and indeed its performance is competitive with respect to MQV (especially when one includes the transmission and verification of certificates in the MQV protocol, which are not required in an id-based scheme). Our protocol requires a single round of communication in which each party sends only 2 group elements: a very short message, especially when the protocol is implemented over elliptic curves. We provide a full proof of security in the Canetti-Krawczyk security model for key exchange, including a proof that our protocol satisfies additional security properties such as forward secrecy, and resistance to reflection and key-compromise impersonation attacks.
Author Fiore, Dario
Gennaro, Rosario
Author_xml – sequence: 1
  givenname: Dario
  surname: Fiore
  fullname: Fiore, Dario
  email: dario.fiore@ens.fr
  organization: CNRS - INRIA, École Normale Supérieure, Paris
– sequence: 2
  givenname: Rosario
  surname: Gennaro
  fullname: Gennaro, Rosario
  email: rosario@us.ibm.com
  organization: IBM T.J. Watson Research Center, Hawthorne
BookMark eNo1kMtOwzAQRQ0URFr6BWzyAwa_4scSqgIVlegCJHaW49htoEpC7Ar69zgtzGY0jzujc8dg1LSNA-AaoxuMkLhVQkIKOSMQC6YULDQ9AWOaGof6_RRkWHIOmWD4DEzT-v9MyhHIEEUEKsHoBci4EkRRTuUlmIbwgVIwwYUsMsAXlWtiHffw3gRX5c9un89_7MY0a5ev-ja2tt2G_LuOm3YX85Wp-7pZhytw7s02uOlfnoC3h_nr7AkuXx4Xs7sl7AhDETpvSklKybzy1hphrCq9YhX2THFBC1Ey7iTBVljrvCXKl6WonFOSGuZUQScAH--Gbvjrel227WfQGOnBJJ2oNdWJWx9M0cmkpCFHTde3XzsXonaDyCbO3mwTWhddHzRFnBOKh1OFoL_NtWf7
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DBID FFUUA
DOI 10.1007/978-3-642-17499-5_3
DatabaseName ProQuest Ebook Central - Book Chapters - Demo use only
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 364217499X
9783642174995
EISSN 1866-4741
Editor Tan, C. J. Kenneth
Gavrilova, Marina L
Editor_xml – sequence: 1
  fullname: Gavrilova, Marina L
– sequence: 3
  fullname: Tan, C. J. Kenneth
EndPage 77
ExternalDocumentID EBC3066231_10_57
GroupedDBID 089
0D6
0DA
0E8
2HV
38.
4UP
4V3
A4J
AABBV
AAJYQ
AATVQ
ABBUY
ABBVZ
ABCYT
ABMKK
ABMNI
ACDPG
ACDTA
ACDUY
ACZTO
AEDXK
AEHEY
AEJLV
AEKFX
AEOKE
AETDV
AEZAY
AHNNE
AHSMR
ALMA_UNASSIGNED_HOLDINGS
ATJMZ
AZZ
BBABE
CZZ
FFUUA
I4C
IEZ
IW0
JJU
MW~
MYL
SBO
TBMHI
TPJZQ
TSXQS
Z5O
Z7R
Z7S
Z7U
Z7V
Z7W
Z7X
Z7Y
Z7Z
Z81
Z83
Z84
Z85
Z87
Z88
-DT
-GH
-~X
1SB
29L
2HA
5QI
875
AASHB
ACGFS
ADCXD
AEFIE
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-p240t-efab82b84f9fcca7ac9bf94d1f4967357b46e821c7ccefc29fbb7dee983a4e953
ISBN 9783642174988
3642174981
ISSN 0302-9743
IngestDate Wed Sep 17 03:58:08 EDT 2025
Tue Oct 21 00:15:51 EDT 2025
IsPeerReviewed true
IsScholarly true
LCCallNum TK5105.5-5105.9
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-p240t-efab82b84f9fcca7ac9bf94d1f4967357b46e821c7ccefc29fbb7dee983a4e953
Notes An extended abstract of this paper appears in the proceedings of CT-RSA 2010 [18].
OCLC 697293638
PQID EBC3066231_10_57
PageCount 36
ParticipantIDs springer_books_10_1007_978_3_642_17499_5_3
proquest_ebookcentralchapters_3066231_10_57
PublicationCentury 2000
PublicationDate 2010-01-01
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – month: 01
  year: 2010
  text: 2010-01-01
  day: 01
PublicationDecade 2010
PublicationPlace Germany
PublicationPlace_xml – name: Germany
– name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle Special Issue on Security in Computing, Part I
PublicationTitle Transactions on Computational Science X
PublicationYear 2010
Publisher Springer Berlin / Heidelberg
Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin / Heidelberg
– name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssj0000476785
ssj0002792
Score 1.8732775
Snippet This paper presents a new identity based key agreement protocol. In id-based cryptography (introduced by Adi Shamir in [34]) each party uses its own identity...
SourceID springer
proquest
SourceType Publisher
StartPage 42
SubjectTerms Forward Secrecy
Public Parameter
Random Exponent
Random Oracle
Uncorrupted Party
Title Identity-Based Key Exchange Protocols without Pairings
URI http://ebookcentral.proquest.com/lib/SITE_ID/reader.action?docID=3066231&ppg=57
http://link.springer.com/10.1007/978-3-642-17499-5_3
Volume 6340
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELbocgEOhQKiFFAOnFgZNbHjx4FDC4uqUlUItWhvVuzYUi8b1A1Sy69n_EqyC0Iql2iVRGt7PmfsGc83g9Bbb281zDgsKbWYVobDJwU2j61hea5anyE9BMies5NLerqsl2NV1MAu6fV78-uvvJL_QRXuAa6eJXsHZIc_hRvwG_CFKyAM163N76abdVxlIi0huPxjfYbs28vf7HIA6CpF1H4C67gbwm5AzzaR6vKtW49PUnx7ZPHe4mNY69r5F9Afi5tIFfYMg76DWRTpcT66-WtzdT343f347frDWTqiOO_6EPk1z1UkcgenXocQvDb1OmSv4_wfSbkCQYR6k0eKiYoFrVJhsGKiWrNR7QrGMOUxBVZSpTHpVlqUY6mXP9T9NMIDmsK-LYlrRXbQDrQ-Q_ePFqdn3wen2yHljE_sI589MR4zxS558k_uchnTM41DGHJWxbTEWy1uWChbh-phr3LxGD3y_JXCE0tAzk_QPbvaQ7tZ7kWS-x56OElF-RSxTawLwLrIWBcD1kXCushYP0OXnxcXH09wqqmBf8DercfWNVpUWlAnHXy8vDFSO0nb0lHJOKm5psyKqjTcGOtMJZ3WvLVWCtJQK2vyHM1W3cq-QEXLwLYQohYWjHInDzVxJTFNAxY4L2lb7aN5logKJ_8p3NjE8a8V8dUHSKnADq35PnqXhab8y2uVE2qDsBVRIGwVhK1A2C_v8vIBejDO4Fdo1l__tK9hJ9nrN2l-_AZKHWsq
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Transactions+on+Computational+Science+X&rft.au=Fiore%2C+Dario&rft.au=Gennaro%2C+Rosario&rft.atitle=Identity-Based+Key+Exchange+Protocols+without+Pairings&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642174988&rft.issn=0302-9743&rft.eissn=1866-4741&rft.spage=42&rft.epage=77&rft_id=info:doi/10.1007%2F978-3-642-17499-5_3
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=https%3A%2F%2Febookcentral.proquest.com%2Fcovers%2F3066231-l.jpg