Generalization of Multiple Key Agreement Protocol based on Bilinear Pairings

In practice, we usually require a key agreement protocol to establish a common secret key for enciphering/ deciphering messages. Now, most protocols can establish n 2 common secret keys in a single round of messages exchange. In this paper, we shall propose an extended proto col to establish 2n 2 common secret keys in a single round. The proposed protocol is based on bilinear pairings. Moreover, the correctness, security, and efficiency of our proposed protocol are presented.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Rainer A. Rueppel,et al.  Weaknesses in some recent key agreement protocols , 1994 .

[3]  Cheng-Chi Lee,et al.  Improved Yen-Joye's authenticated multiple-key agreement protocol , 2002 .

[4]  Chien-Lung Hsu,et al.  Security of authenticated multiple-key agreement protocols , 1999 .

[5]  Narn-Yih Lee,et al.  Improved authentication key exchange protocol without using one-way hash function , 2004, OPSR.

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  TsengYuh-Min Robust generalized MQV key agreement protocol without using one-way hash functions , 2002 .

[8]  Zuhua Shao Security of robust generalized MQV key agreement protocol without using one-way hash functions , 2003, Comput. Stand. Interfaces.

[9]  Marc Joye,et al.  Improved authenticated multiple-key agreement protocol , 1998 .

[10]  Chien-Chih Wang,et al.  Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings , 2008, Comput. Electr. Eng..

[11]  Lein Harn,et al.  Authenticated key agreement without using one-way hash functions , 2001 .

[12]  Min-Ho Kim,et al.  Improving the Novikov and Kiselev User Authentication Scheme , 2008, Int. J. Netw. Secur..

[13]  Amit K. Awasthi,et al.  ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2005, Int. J. Netw. Secur..

[14]  Ren-Junn Hwang,et al.  An enhanced authentication key exchange protocol , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..

[15]  Cheng-Chi Lee,et al.  Man-in-the-Middle Attack on the Authentication of the User from the Remote Autonomous Object , 2005, Int. J. Netw. Secur..

[16]  Kyung-Ah Shim Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions , 2007, Comput. Stand. Interfaces.