Skip to main content
Log in

Escrow-free certificate-based authenticated key agreement protocol from pairings

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Key agreement protocols are essential for secure communications. In this paper, to solve the inherent key escrow problem of identity-based cryptography, an escrow-free certificate-based authenticated key agreement (CB-AK) protocol with perfect forward secrecy is proposed. Our protocol makes use of pairings on elliptic curves. The protocol is described and its properties are discussed though comparison with Smart’s protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Law L, Menezes A J, Qu M, et al. An Efficient Protocol for Authenticated Key Agreement[J]. Des Codes Cryptogr, 2003, 28(2): 119–134.

    Article  Google Scholar 

  2. Blake W S, Menezes A. Authenticated Diffie-Hellman Key Agreement Protocols[C]//Proc of SAC’98, LNCS 1556. Berlin: Springer-Verlag, 1999: 339–361.

    Google Scholar 

  3. Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. New York: CRC Press, 1997: 237–238.

    Google Scholar 

  4. Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans Inf Theory, 1976, 22(6): 644–654.

    Article  Google Scholar 

  5. Smart N P. An ID-Based Authenticated Key Agreement Protocol Based on the Weil Pairing[J]. Electron Lett, 2002, 38(13): 630–632.

    Article  Google Scholar 

  6. Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[C]//Proc of CRYPTO 2001, LNCS 2139. Berlin: Springer-Verlag, 2001: 213–229.

    Google Scholar 

  7. Gentry C. Certificate-Based Encryption and the Certificate Revocation Problem[C]//Proc of EUROCRYPT 2003, LNCS 2656. Berlin: Springer-Verlag, 2003: 272–293.

    Google Scholar 

  8. Shim K. Efficient ID-Based Authenticated Key Agreement Protocol Based on Weil Pairing[J]. Electron Lett, 2003, 39(8): 653–654.

    Article  Google Scholar 

  9. Ryu E K, Yoon E J, Yoo, K Y. An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings[C]//Proc of Networking 2004, LNCS 3042. Berlin: Springer-Verlag, 2004: 1458–1463.

    Google Scholar 

  10. Chen L, Kudla C. Identity Based Key Agreement Protocols from Pairings[C]//Proc of the 16th IEEE Computer Security Foundations Workshop. Asilomar, CA: IEEE Computer Society, 2002: 219–223.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cao Zhenfu.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60225007, 60572155) and the Science and Technology Research Project of Shanghai (04DZ07067)

Biography: WANG Shengbao (1978–), male, Ph.D. candidate, research direction: applied cryptography, network security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, S., Cao, Z. Escrow-free certificate-based authenticated key agreement protocol from pairings. Wuhan Univ. J. of Nat. Sci. 12, 63–66 (2007). https://doi.org/10.1007/s11859-006-0189-8

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-006-0189-8

Key words

CLC number

Navigation