Sufficient condition for identity-based authenticated key exchange resilient to leakage of secret keys

  • Authors:
  • Atsushi Fujioka;Koutarou Suzuki

  • Affiliations:
  • NTT Information Sharing Platform Laboratories, Musashino-shi, Tokyo, Japan;NTT Information Sharing Platform Laboratories, Musashino-shi, Tokyo, Japan

  • Venue:
  • ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we provide a sufficient condition, called admissible polynomials, to construct a two-pass identity-based authenticated key exchange (ID-AKE) protocol secure in the identity-based extended Canetti-Krawczyk (id-eCK) model. The proposed ID-AKE protocol is secure under the gap Bilinear Diffie-Hellman assumption in the random oracle model.