Font Size: a A A

Authenticated Key Agreement Protocol

Posted on:2009-03-20Degree:MasterType:Thesis
Country:ChinaCandidate:L J JinFull Text:PDF
GTID:2208360245961765Subject:Information security
Abstract/Summary:PDF Full Text Request
Along with the development of the mobile communication and network, the application of the network became popular. There are many kinds of network service for the demand. With the electronic business, every one can trade on the network in home instead of going out currently. A great number of personal information pass the network, so the security of the information was paid more attention to. People always encrypt the messages before they send them for the security reason. In modern cryptography, the security of the messages after encrypted (which we called cryptograph) is based on the security of the key. It means that someone can only decrypt the cryptograph when he known the key. The security of the key is important. And the key agreement protocol can deal with this problem.Many researchers are focus on the study of the authenticated key agreement protocol between two parties. An Identity-based authenticated key agreement protocol (IBAKAP) has been proposed. In this protocol, each entity operate bilinear paring, and the protocol is efficient. But this protocol didn't provide unknown key-share resilience. To solve this problem, a new protocol SAKEP is proposed on the base of the IBAKAP. And the security of the SAKEP has been proved in the Bellare-Rogaway modern. So it is a Security-provable authenticated key agreement protocol.The authenticated group key agreement protocol is also a challenging task. Expand the SAKEP to get an authenticated group key agreement protocol. The security of this protocol is also proved in the Bellare-Rogaway modern. At last, for the efficient demand, an identity-based authenticated group key agreement protocol from multi-linear forms is proposed. This protocol is a one round protocol, and its security has been proved in the Bellare-Rogaway modern.
Keywords/Search Tags:Key agreement, authenticated, identity-based cryptography, bilinear pairing, multilinear forms
PDF Full Text Request
Related items