Interdomain Identity-Based Key Agreement Schemes
In order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and w...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2014-01-01
|
Series: | Mathematical Problems in Engineering |
Online Access: | http://dx.doi.org/10.1155/2014/865367 |
id |
doaj-018a6ad2f3624bf992d3a5c0a929e10d |
---|---|
record_format |
Article |
spelling |
doaj-018a6ad2f3624bf992d3a5c0a929e10d2020-11-24T23:47:11ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472014-01-01201410.1155/2014/865367865367Interdomain Identity-Based Key Agreement SchemesChun-I Fan0Yi-Hui Lin1Tuan-Hung Hsu2Ruei-Hau Hsu3Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, TaiwanInstitute of Information Science, Academia Sinica, Taipei 115, TaiwanDepartment of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, TaiwanCollege of Computer Science, National Chiao Tung University, Hsinchu 300, TaiwanIn order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and wireless environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard to extend two- or three-party schemes to multiparty ones with the guarantee of efficiency and security. In addition to the above two properties, interdomain environments should also be considered in key agreement systems due to diversified network domains. However, only few identity-based multiparty conference key agreement schemes for single domain environments and none for interdomain environments were proposed in the literature and they did not satisfy all of the security attributes such as forward secrecy and withstanding impersonation. In this paper, we will propose a novel efficient single domain identity-based multiparty conference key scheme and extend it to an interdomain one. Finally, we prove that the proposed schemes satisfy the required security attributes via formal methods.http://dx.doi.org/10.1155/2014/865367 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Chun-I Fan Yi-Hui Lin Tuan-Hung Hsu Ruei-Hau Hsu |
spellingShingle |
Chun-I Fan Yi-Hui Lin Tuan-Hung Hsu Ruei-Hau Hsu Interdomain Identity-Based Key Agreement Schemes Mathematical Problems in Engineering |
author_facet |
Chun-I Fan Yi-Hui Lin Tuan-Hung Hsu Ruei-Hau Hsu |
author_sort |
Chun-I Fan |
title |
Interdomain Identity-Based Key Agreement Schemes |
title_short |
Interdomain Identity-Based Key Agreement Schemes |
title_full |
Interdomain Identity-Based Key Agreement Schemes |
title_fullStr |
Interdomain Identity-Based Key Agreement Schemes |
title_full_unstemmed |
Interdomain Identity-Based Key Agreement Schemes |
title_sort |
interdomain identity-based key agreement schemes |
publisher |
Hindawi Limited |
series |
Mathematical Problems in Engineering |
issn |
1024-123X 1563-5147 |
publishDate |
2014-01-01 |
description |
In order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and wireless environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard to extend two- or three-party schemes to multiparty ones with the guarantee of efficiency and security. In addition to the above two properties, interdomain environments should also be considered in key agreement systems due to diversified network domains. However, only few identity-based multiparty conference key agreement schemes for single domain environments and none for interdomain environments were proposed in the literature and they did not satisfy all of the security attributes such as forward secrecy and withstanding impersonation. In this paper, we will propose a novel efficient single domain identity-based multiparty conference key scheme and extend it to an interdomain one. Finally, we prove that the proposed schemes satisfy the required security attributes via
formal methods. |
url |
http://dx.doi.org/10.1155/2014/865367 |
work_keys_str_mv |
AT chunifan interdomainidentitybasedkeyagreementschemes AT yihuilin interdomainidentitybasedkeyagreementschemes AT tuanhunghsu interdomainidentitybasedkeyagreementschemes AT rueihauhsu interdomainidentitybasedkeyagreementschemes |
_version_ |
1725491115848630272 |