Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
An identity-based key-exchange protocol
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Provably secure session key distribution: the three party case
STOC '95 Proceedings of the twenty-seventh annual ACM symposium on Theory of computing
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Identity-based key agreement protocols from pairings
International Journal of Information Security
Efficient One-Round Key Exchange in the Standard Model
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Stronger security of authenticated key exchange
ProvSec'07 Proceedings of the 1st international conference on Provable security
A new security model for authenticated key agreement
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
A generic variant of NIST's KAS2 key agreement protocol
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Integrating identity-based and certificate-based authenticated key exchange protocols
International Journal of Information Security
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
HMQV: a high-performance secure diffie-hellman protocol
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Making the diffie-hellman protocol identity-based
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
New directions in cryptography
IEEE Transactions on Information Theory
Strongly secure authenticated key exchange from factoring, codes, and lattices
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
Strongly-secure identity-based key agreement and anonymous extension
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
Authenticated key exchange (AKE) protocol is one of the most widely used cryptographic primitives, and lots of protocols have been proposed either in the certificate-based (cert-based) setting or in the identity-based (id-based) setting. In practical applications, entities from different settings may have the requirement to communicate with each other. Though there are works concentrated on supporting either multiple certification authorities (CAs) or multiple key generation centers (KGCs), very few papers have focused on the interoperability between the two settings. Furthermore, existing approaches are still inadequate in supporting parameters from different algebraic groups introduced by multiple CAs and multiple KGCs. In this paper, we focus on AKE protocols integrating cert-based settings and id-based settings with varied groups, and propose an AKE protocol where one entity is cert-based and the other is id-based, and the parameters of both entities may come from different groups. An extended AKE security model of [6,22] is proposed to support multiple KGCs and CAs. The proposed protocol is proved to be secure in the extended security model. Finally, we extend the protocol to achieve forward secrecy and resistance to leakage of both ephemeral keys.