Security model for ID-based key exchange
The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the charac...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2010-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/zh/article/74648882/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850126115316695040 |
|---|---|
| author | LIU Wen-ju1 ZHANG Jun-wei2 MA Jian-feng2 YANG Chao2 LI Xing-hua2 |
| author_facet | LIU Wen-ju1 ZHANG Jun-wei2 MA Jian-feng2 YANG Chao2 LI Xing-hua2 |
| author_sort | LIU Wen-ju1 |
| collection | DOAJ |
| description | The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the characteristics of ID-based key exchange, the ideal functionality of ID-based key exchange was presented. Based on the adversary model and the ideal functionality, the proposed model captures not only the universally composable security of ID-based key exchange, but also implies one of the important properties of ID-based key exchange——key generation center forward secrecy. In addition, the protocol (with key confirmation) proposed by Chen and Kudla can securely realize the functionality of ID-based KE with KGC-FS. |
| format | Article |
| id | doaj-art-22b330d59b16499283f591a8f80fcb93 |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2010-01-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-22b330d59b16499283f591a8f80fcb932025-08-20T02:33:59ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2010-01-0131899474648882Security model for ID-based key exchangeLIU Wen-ju1ZHANG Jun-wei2MA Jian-feng2YANG Chao2LI Xing-hua2The provable security of ID-based key exchange protocols was investigated. In the universally composable framework, the provable secure model of ID-based key exchange was proposed. The ability of the adversary to corrupt key generation center was added to the adversary model. According to the characteristics of ID-based key exchange, the ideal functionality of ID-based key exchange was presented. Based on the adversary model and the ideal functionality, the proposed model captures not only the universally composable security of ID-based key exchange, but also implies one of the important properties of ID-based key exchange——key generation center forward secrecy. In addition, the protocol (with key confirmation) proposed by Chen and Kudla can securely realize the functionality of ID-based KE with KGC-FS.http://www.joconline.com.cn/zh/article/74648882/ID-based key exchangeUC securekey generation center forward secrecy |
| spellingShingle | LIU Wen-ju1 ZHANG Jun-wei2 MA Jian-feng2 YANG Chao2 LI Xing-hua2 Security model for ID-based key exchange Tongxin xuebao ID-based key exchange UC secure key generation center forward secrecy |
| title | Security model for ID-based key exchange |
| title_full | Security model for ID-based key exchange |
| title_fullStr | Security model for ID-based key exchange |
| title_full_unstemmed | Security model for ID-based key exchange |
| title_short | Security model for ID-based key exchange |
| title_sort | security model for id based key exchange |
| topic | ID-based key exchange UC secure key generation center forward secrecy |
| url | http://www.joconline.com.cn/zh/article/74648882/ |
| work_keys_str_mv | AT liuwenju1 securitymodelforidbasedkeyexchange AT zhangjunwei2 securitymodelforidbasedkeyexchange AT majianfeng2 securitymodelforidbasedkeyexchange AT yangchao2 securitymodelforidbasedkeyexchange AT lixinghua2 securitymodelforidbasedkeyexchange |