Skip to main content
placeholder image

A provable secure ID-based explicit authenticated key agreement protocol without random oracles

Journal Article


Download full-text (Open Access)

Abstract


  • In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure

    without random oracles. The protocol employs a new method to isolate a session key from key con¯rmation keys so that

    there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant

    of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We

    believe that this key isolation method is novel and can be further studied for constructing more e±cient protocols.

UOW Authors


  •   Tian, Haibo (external author)
  •   Susilo, Willy
  •   Ming, Yang (external author)
  •   Wang, Yumin (external author)

Publication Date


  • 2008

Citation


  • Tian, H., Susilo, W., Ming, Y. & Wang, Y. (2008). A provable secure ID-based explicit authenticated key agreement protocol without random oracles. Journal of Computer Science and Technology, 23 (5), 832-842.

Scopus Eid


  • 2-s2.0-55549101275

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2850&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1830

Has Global Citation Frequency


Number Of Pages


  • 10

Start Page


  • 832

End Page


  • 842

Volume


  • 23

Issue


  • 5

Place Of Publication


  • United States

Abstract


  • In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure

    without random oracles. The protocol employs a new method to isolate a session key from key con¯rmation keys so that

    there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant

    of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We

    believe that this key isolation method is novel and can be further studied for constructing more e±cient protocols.

UOW Authors


  •   Tian, Haibo (external author)
  •   Susilo, Willy
  •   Ming, Yang (external author)
  •   Wang, Yumin (external author)

Publication Date


  • 2008

Citation


  • Tian, H., Susilo, W., Ming, Y. & Wang, Y. (2008). A provable secure ID-based explicit authenticated key agreement protocol without random oracles. Journal of Computer Science and Technology, 23 (5), 832-842.

Scopus Eid


  • 2-s2.0-55549101275

Ro Full-text Url


  • http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2850&context=infopapers

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/1830

Has Global Citation Frequency


Number Of Pages


  • 10

Start Page


  • 832

End Page


  • 842

Volume


  • 23

Issue


  • 5

Place Of Publication


  • United States