Abstract
This paper presents an identity-based key agreement protocols that are provably secure without random oracles (namely, in the standard model). It is inspired by a new identity-based encryption scheme first proposed by Gentry. This paper details how this key agreement can be used in either escrowed or escrowless mode. All the proposed protocols are compared performance (with respect to computational and communication efficiencies) to all known protocols that are only proven secure in the random oracle model.
| Original language | English |
|---|---|
| Pages (from-to) | 1842-1852 |
| Number of pages | 11 |
| Journal | Jisuanji Xuebao/Chinese Journal of Computers |
| Volume | 30 |
| Issue number | 10 |
| State | Published - Oct 2007 |
| Externally published | Yes |
Keywords
- Authenticated key agreement
- Bilinear pairings
- Identity-based cryptography
- Standard model