Security of two-party identity-based key agreement

  • Authors:
  • Colin Boyd;Kim-Kwang Raymond Choo

  • Affiliations:
  • Information Security Institute, Queensland University of Technology, Brisbane, Australia;Information Security Institute, Queensland University of Technology, Brisbane, Australia

  • Venue:
  • Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Identity-based cryptography has become extremely fashionable in the last few years. As a consequence many proposals for identity-based key establishment have emerged, the majority in the two party case. We survey the currently proposed protocols of this type, examining their security and efficiency. Problems with some published protocols are noted.