Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode

Date

2009

Authors

Wang, S.
Cao, Z.
Cheng, Z.
Choo, K.K.R.

Editors

Advisors

Journal Title

Journal ISSN

Volume Title

Type:

Journal article

Citation

Science China Information Sciences, 2009; 52(8):1358-1370

Statement of Responsibility

Conference Name

Abstract

There are several essential features in key agreement protocols such as key escrow (essential when con¯dentiality, audit trail and legal interception are required) and perfect forward secrecy (i.e., the security of a session key estab- lished between two or more entities is guaranteed even when the private keys of the entities are compromised). Majority of the existing escrowable identity-based key agreement protocols, however, only provide partial forward secrecy. Therefore, such protocols are unsuitable for real-word applications that require a stronger sense of forward secrecy | perfect forward secrecy. In this paper, we propose an e±cient perfect forward secure identity-based key agreement protocol in the escrow mode. We prove the security of our protocol in the random oracle model, assuming the intractability of the Gap Bilinear Di±e-Hellman (GBDH) problem. Security proofs are invaluable tools in assuring protocol implementers about the security properties of protocols. We note, however, that many existing security proofs of previously published identity-based protocols entail lengthy and compli- cated mathematical proofs. In this paper, our proof adopts a modular approach and, hence, simpler to follow.

School/Discipline

Dissertation Note

Provenance

Description

Access Status

Rights

Copyright 2009 Science in China Press, published by Springer

License

Grant ID

Call number

Persistent link to this record