ID-based authenticated key agreement for low-power mobile devices

  • Authors:
  • Kyu Young Choi;Jung Yeon Hwang;Dong Hoon Lee;In Seog Seo

  • Affiliations:
  • Center for Information Security Technologies(CIST), Korea University, Seoul, Korea;Center for Information Security Technologies(CIST), Korea University, Seoul, Korea;Center for Information Security Technologies(CIST), Korea University, Seoul, Korea;National Security Research Institute(NSRI), Daejeon, Korea

  • Venue:
  • ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments : an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients’ devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, key agreement and ID-based authenticryption in which only designated verifier (or Sever) can verify the validity of a given transcript. We prove the security of our ID-based AKA protocols in therandom oracle model.