Security model for ID-based key exchange

The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the charac...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU Wen-ju1, ZHANG Jun-wei2, MA Jian-feng2, YANG Chao2, LI Xing-hua2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2010-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74648882/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537675732975616
author LIU Wen-ju1
ZHANG Jun-wei2
MA Jian-feng2
YANG Chao2
LI Xing-hua2
author_facet LIU Wen-ju1
ZHANG Jun-wei2
MA Jian-feng2
YANG Chao2
LI Xing-hua2
author_sort LIU Wen-ju1
collection DOAJ
description The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the characteristics of ID-based key exchange, the ideal functionality of ID-based key exchange was presented. Based on the adversary model and the ideal functionality, the proposed model captures not only the universally composable security of ID-based key exchange, but also implies one of the important properties of ID-based key exchange——key generation center forward secrecy. In addition, the protocol (with key confirmation) proposed by Chen and Kudla can securely realize the functionality of ID-based KE with KGC-FS.
format Article
id doaj-art-22b330d59b16499283f591a8f80fcb93
institution Kabale University
issn 1000-436X
language zho
publishDate 2010-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-22b330d59b16499283f591a8f80fcb932025-01-14T08:26:22ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131899474648882Security model for ID-based key exchangeLIU Wen-ju1ZHANG Jun-wei2MA Jian-feng2YANG Chao2LI Xing-hua2The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the characteristics of ID-based key exchange, the ideal functionality of ID-based key exchange was presented. Based on the adversary model and the ideal functionality, the proposed model captures not only the universally composable security of ID-based key exchange, but also implies one of the important properties of ID-based key exchange——key generation center forward secrecy. In addition, the protocol (with key confirmation) proposed by Chen and Kudla can securely realize the functionality of ID-based KE with KGC-FS.http://www.joconline.com.cn/zh/article/74648882/ID-based key exchangeUC securekey generation center forward secrecy
spellingShingle LIU Wen-ju1
ZHANG Jun-wei2
MA Jian-feng2
YANG Chao2
LI Xing-hua2
Security model for ID-based key exchange
Tongxin xuebao
ID-based key exchange
UC secure
key generation center forward secrecy
title Security model for ID-based key exchange
title_full Security model for ID-based key exchange
title_fullStr Security model for ID-based key exchange
title_full_unstemmed Security model for ID-based key exchange
title_short Security model for ID-based key exchange
title_sort security model for id based key exchange
topic ID-based key exchange
UC secure
key generation center forward secrecy
url http://www.joconline.com.cn/zh/article/74648882/
work_keys_str_mv AT liuwenju1 securitymodelforidbasedkeyexchange
AT zhangjunwei2 securitymodelforidbasedkeyexchange
AT majianfeng2 securitymodelforidbasedkeyexchange
AT yangchao2 securitymodelforidbasedkeyexchange
AT lixinghua2 securitymodelforidbasedkeyexchange