More efficient identity-based authenticated key agreement with perfect forward secrecy

Shengbao Wang, Zhenfu Cao, Feng Cao

Research output: Contribution to journalArticlepeer-review

Abstract

In 2002, Chen and Kudla proposed a novel identity-based authenticated key agreement protocol using elliptic curve bilinear pairings. Their protocol (referred to as Protocol 2' in their paper) is the most efficient one among such identity-based authenticated key agreement protocols that provides perfect forward secrecy (PFS) with only 1 pairing evaluation for each protocol participant. But, each party needs to transmit 2 elliptic curve points to its partner. In this paper, we propose a new identity-based authenticated key agreement protocol which is not only more computationally efficient but also, most importantly, reduces the total communication overheads to 50%. Furthermore, we show that our new protocol, same as Protocol 2′, achieves perfect forward secrecy as well as all the other desirable security attributes of authenticated key agreement protocols.

Original languageEnglish
Pages (from-to)317-323
Number of pages7
JournalJournal of Information and Computational Science
Volume4
Issue number1
StatePublished - Mar 2007
Externally publishedYes

Keywords

  • Authenticated key agreement (AK)
  • Bilinear pairing
  • Cryptographic protocol
  • Identity-based cryptosystem
  • Perfect forward secrecy (PFS)

Fingerprint

Dive into the research topics of 'More efficient identity-based authenticated key agreement with perfect forward secrecy'. Together they form a unique fingerprint.

Cite this