Interdomain Identity-Based Key Agreement Schemes

In order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and w...

Full description

Bibliographic Details
Main Authors: Chun-I Fan, Yi-Hui Lin, Tuan-Hung Hsu, Ruei-Hau Hsu
Format: Article
Language:English
Published: Hindawi Limited 2014-01-01
Series:Mathematical Problems in Engineering
Online Access:http://dx.doi.org/10.1155/2014/865367
id doaj-018a6ad2f3624bf992d3a5c0a929e10d
record_format Article
spelling doaj-018a6ad2f3624bf992d3a5c0a929e10d2020-11-24T23:47:11ZengHindawi LimitedMathematical Problems in Engineering1024-123X1563-51472014-01-01201410.1155/2014/865367865367Interdomain Identity-Based Key Agreement SchemesChun-I Fan0Yi-Hui Lin1Tuan-Hung Hsu2Ruei-Hau Hsu3Department of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, TaiwanInstitute of Information Science, Academia Sinica, Taipei 115, TaiwanDepartment of Computer Science and Engineering, National Sun Yat-sen University, Kaohsiung 804, TaiwanCollege of Computer Science, National Chiao Tung University, Hsinchu 300, TaiwanIn order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and wireless environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard to extend two- or three-party schemes to multiparty ones with the guarantee of efficiency and security. In addition to the above two properties, interdomain environments should also be considered in key agreement systems due to diversified network domains. However, only few identity-based multiparty conference key agreement schemes for single domain environments and none for interdomain environments were proposed in the literature and they did not satisfy all of the security attributes such as forward secrecy and withstanding impersonation. In this paper, we will propose a novel efficient single domain identity-based multiparty conference key scheme and extend it to an interdomain one. Finally, we prove that the proposed schemes satisfy the required security attributes via formal methods.http://dx.doi.org/10.1155/2014/865367
collection DOAJ
language English
format Article
sources DOAJ
author Chun-I Fan
Yi-Hui Lin
Tuan-Hung Hsu
Ruei-Hau Hsu
spellingShingle Chun-I Fan
Yi-Hui Lin
Tuan-Hung Hsu
Ruei-Hau Hsu
Interdomain Identity-Based Key Agreement Schemes
Mathematical Problems in Engineering
author_facet Chun-I Fan
Yi-Hui Lin
Tuan-Hung Hsu
Ruei-Hau Hsu
author_sort Chun-I Fan
title Interdomain Identity-Based Key Agreement Schemes
title_short Interdomain Identity-Based Key Agreement Schemes
title_full Interdomain Identity-Based Key Agreement Schemes
title_fullStr Interdomain Identity-Based Key Agreement Schemes
title_full_unstemmed Interdomain Identity-Based Key Agreement Schemes
title_sort interdomain identity-based key agreement schemes
publisher Hindawi Limited
series Mathematical Problems in Engineering
issn 1024-123X
1563-5147
publishDate 2014-01-01
description In order to simplify key management, two-party and three-party key agreement schemes based on user identities have been proposed recently. Multiparty (including more than three parties) key agreement protocols, which also are called conference key schemes, can be applied to distributed systems and wireless environments, such as ad hoc networks, for the purpose of multiparty secure communication. However, it is hard to extend two- or three-party schemes to multiparty ones with the guarantee of efficiency and security. In addition to the above two properties, interdomain environments should also be considered in key agreement systems due to diversified network domains. However, only few identity-based multiparty conference key agreement schemes for single domain environments and none for interdomain environments were proposed in the literature and they did not satisfy all of the security attributes such as forward secrecy and withstanding impersonation. In this paper, we will propose a novel efficient single domain identity-based multiparty conference key scheme and extend it to an interdomain one. Finally, we prove that the proposed schemes satisfy the required security attributes via formal methods.
url http://dx.doi.org/10.1155/2014/865367
work_keys_str_mv AT chunifan interdomainidentitybasedkeyagreementschemes
AT yihuilin interdomainidentitybasedkeyagreementschemes
AT tuanhunghsu interdomainidentitybasedkeyagreementschemes
AT rueihauhsu interdomainidentitybasedkeyagreementschemes
_version_ 1725491115848630272