Two-pass ID-based authenticated key agreement protocol with key confirmation using pairings

Wang Shengbao, Cao Zhenfu, Bao Haiyong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

In the area of secure communications, key agreement is one of the most important issues. In this paper, a practical two-party ID-based authenticated key agreement protocol is proposed, which uses pairings on certain elliptic curves. An important advantage of our protocol is that it provides unilateral key confirmation to the protocol initiator only in two passes. We first put forward a variant of the ID-based signature scheme due to Sakai et al., then we describe our protocol, which uses the variant as a building block. We show that the newly proposed key agreement protocol is fit for real-world applications, and at the same time, it satisfies every desired security requirements of key agreement protocols.

Original languageEnglish
Title of host publicationFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Pages109-112
Number of pages4
DOIs
StatePublished - 2006
Externally publishedYes
EventFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06 - Hangzhou, Zhejiang, China
Duration: 20 Apr 200624 Apr 2006

Publication series

NameFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Volume2

Conference

ConferenceFirst International Multi- Symposiums on Computer and Computational Sciences, IMSCCS'06
Country/TerritoryChina
CityHangzhou, Zhejiang
Period20/04/0624/04/06

Fingerprint

Dive into the research topics of 'Two-pass ID-based authenticated key agreement protocol with key confirmation using pairings'. Together they form a unique fingerprint.

Cite this