Security model for ID-based key exchange
The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the charac...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2010-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74648882/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the characteristics of ID-based key exchange, the ideal functionality of ID-based key exchange was presented. Based on the adversary model and the ideal functionality, the proposed model captures not only the universally composable security of ID-based key exchange, but also implies one of the important properties of ID-based key exchange——key generation center forward secrecy. In addition, the protocol (with key confirmation) proposed by Chen and Kudla can securely realize the functionality of ID-based KE with KGC-FS. |
---|---|
ISSN: | 1000-436X |