A Novel and Secure Multiparty Key Exchange Scheme Using Trilinear Pairing Map Based on Elliptic Curve Cryptography

Elliptic curves have been broadly studied for more than hundred years. Recently they have become a tool in various important applied fields such as coding theory, pseudorandom bit generation, number theory algorithms, etc. Actually, elliptic curve cryptography (ECC) is an alternative technique for conventional asymmetric cryptography like RSA, DSA, and Diffie–Hellman key exchange scheme. Instead of larger key size, ECC uses smaller key size to provide the highest strength-per-bit of any cryptographic system known today. This results in faster computations, lower power consumption, and less memory allocations. Another benefit of using ECC is that authentication schemes based on ECC are much secure even if a small key size is used. ECC also provides a methodology to obtain high speed, efficient, and scalable implementations of protocols for authentication and key agreement. In the present paper, we have discussed a trilinear pairing map on finitely generated free R-modules with rank three, where R is a commutative ring with unity. A trilinear pairing on an elliptic curve is constructed and we used this pairing map to a multiparty key exchange scheme. Since the secret shared key generated among the members of the group is constructed by the contribution of each member of the group, it increases the security of the proposed scheme.

[1]  E. Wright,et al.  An Introduction to the Theory of Numbers , 1939 .

[2]  Alfred Menezes,et al.  Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.

[3]  Victor S. Miller,et al.  Use of Elliptic Curves in Cryptography , 1985, CRYPTO.

[4]  L. Washington Elliptic Curves: Number Theory and Cryptography , 2003 .

[5]  Manoj Kumar,et al.  Cryptographic Schemes Based on Elliptic Curves over the Ring Zp[i] , 2016 .

[6]  Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.

[7]  Joseph H. Silverman,et al.  The arithmetic of elliptic curves , 1986, Graduate texts in mathematics.

[8]  Hamid R. Nemati,et al.  Information Security and Ethics: Concepts, Methodologies, Tools and Applications , 2008 .

[9]  Joseph A. Gallian,et al.  Contemporary Abstract Algebra , 2021 .

[10]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[11]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[12]  Hyang-Sook Lee A self-pairing map and its applications to cryptography , 2004, Appl. Math. Comput..

[13]  A. Weil Sur les fonctions algébriques à corps de constantes fini , 1979 .

[14]  Xinmiao Zhang,et al.  Wireless Security and Cryptography: Specifications and Implementations , 2007 .

[15]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[16]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[17]  William J. Gilbert,et al.  Modern Algebra with Applications , 2002 .