An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem

Hai Huang*, Zhenfu Cao

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

81 Scopus citations

Abstract

In this paper, we present a new ID-based two-party authenticated key exchange (AKE) protocol, which makes use of a new technique called twin Diffie-Hellman problem proposed by Cash, Kiltz and Shoup. We show that our scheme is secure under bilinear Diffie-Hellman (BDH) assumption in the enhanced Canetti-Krawczyk (eCK) model, which better supports the adversary's queries than previous AKE models. To the best of our knowledge, our scheme is the first ID-based AKE protocol provably secure in eCK model.

Original languageEnglish
Title of host publicationProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Pages333-342
Number of pages10
DOIs
StatePublished - 2009
Externally publishedYes
Event4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09 - Sydney, NSW, Australia
Duration: 10 Mar 200912 Mar 2009

Publication series

NameProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09

Conference

Conference4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Country/TerritoryAustralia
CitySydney, NSW
Period10/03/0912/03/09

Keywords

  • Authenticated key exchange
  • BDH problem
  • ID-based
  • Twin Diffie-Hellman

Fingerprint

Dive into the research topics of 'An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem'. Together they form a unique fingerprint.

Cite this