Jump to content United States-English
HP.com Home Products and Services Support and Drivers Solutions How to Buy
» Contact HP

hp.com home


Technical Reports


printable version
» 

HP Labs

» Research
» News and events
» Technical reports
» About HP Labs
» Careers @ HP Labs
» Worldwide sites
» Downloads
Content starts here

 
Click here for full text: PDF

Identity Based Authenticated Key Agreement Protocols from Pairings

Chen, Liqun; Kudla, Caroline

HPL-2003-25

Keyword(s): identity based cryptography; authenticated key agreement; pairings; trusted authority forward secrecy

Abstract: We investigate a number of issues related to identity based authenticated key agreement protocols in the Diffie-Hellman family enabled by the Weil or Tate pairings. These issues include how to make protocols efficient; to avoid key escrow by a Trust Authority (TA) that issues identity based private keys for users, and to allow users to use different TAs. We describe a few authenticated key agreement (AK)protocols and AK with key confirmation (AKC) protocols by modifying Smart's AK protocol. We discuss the security of these protocols heuristically and give formal proofs of security for our AK and AKC protocols (using a security model based on the Bellare-Rogaway model).We also prove that our AK protocol has the key compromise impersonation property. We also show that our second protocol has the TA forward secrecy property (which we define to mean that the compromise of the TA's private key will not compromise previously established session keys), and we note that this also implies that it has the perfect forward secrecy property.

18 Pages

Back to Index

»Technical Reports

» 2009
» 2008
» 2007
» 2006
» 2005
» 2004
» 2003
» 2002
» 2001
» 2000
» 1990 - 1999

Heritage Technical Reports

» Compaq & DEC Technical Reports
» Tandem Technical Reports
Privacy statement Using this site means you accept its terms Feedback to HP Labs
© 2009 Hewlett-Packard Development Company, L.P.