ID-based authenticated key agreement protocol for peer-to-peer computing

  • Rong Xing Lu*
  • , Zhen Fu Cao
  • , Ren Wang Su
  • , Zhen Chuan Chai
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Peer-to-peer computing has recently started to gain significant acceptance, since it can greatly increase the performance and reliability of overall system. However, the security issue is still a major gating factor for its full adoption. In order to guarantee the security of data exchanged between two peers in Peer-to-Peer system, this paper comes up with an ID-based authenticated key agreement from bilinear pairings and uses BAN logic to prove the protocol's security. Compared with other existing protocols, the proposed protocol seems more secure and efficient, since it adopts the static shared Diffie-Hellman key.

Original languageEnglish
Pages (from-to)205-209
Number of pages5
JournalJournal of Shanghai Jiaotong University (Science)
Volume11 E
Issue number2
StatePublished - Jun 2006
Externally publishedYes

Keywords

  • Authenticate key agreement
  • BAN logic
  • Identity based
  • Peer-to-peer computing

Fingerprint

Dive into the research topics of 'ID-based authenticated key agreement protocol for peer-to-peer computing'. Together they form a unique fingerprint.

Cite this