Certificateless Authenticated Key Distribution and Conference Key Distribution Schemes

In this paper, we propose two authenticated key distribution protocols and one conference key protocol using identity-based, self-certified public keys. These proposed protocols have the following properties:(i) No extra public key certificates and computational efforts are required for verification of authenticity for public keys.(ii) Key establishment and validation of the desired public keys are integrated in a logically single step.(iii) Each registering user can use his derived private key to check the validity of his public key issued by the system authority.(iv) The system authority cannot access to users' private keys. Hence, all private keys cannot be compromised in case of disruption or corruption of the system authority.(v) The proposed protocols provide the security property of key authentication whereby one user is assured that no other user aside from specifically identified user (s) may gain access to the derived shared key/conference key.

[1]  Loren M. Kohnfelder,et al.  Towards a practical public-key cryptosystem. , 1978 .

[2]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[3]  Shahrokh Saeednia Identity-Based and Self-Certified Key-Exchange Protocols , 1997, ACISP.

[4]  Xun Yi Efficient ID-based key agreement from Weil pairing , 2003 .

[5]  가나파시 에스 선다람 Identity based authenticated key agreement protocol , 2010 .

[6]  Nigel P. Smart,et al.  AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .

[7]  Tzong-Chen Wu Digital signature/multisignature schemes giving public key verification and message recovery simultaneously , 2001, Comput. Syst. Sci. Eng..

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Guomin Yang,et al.  An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices , 2007, WINE.

[12]  Taher ElGamal,et al.  A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .

[13]  Shahrokh Saeednia,et al.  A note on Girault's self-certified model , 2003, Inf. Process. Lett..

[14]  Joseph K. Liu,et al.  Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract , 2007, ASIACCS '07.

[15]  Tzong-Chen Wu,et al.  Improvement of Saeednia's self-certified key exchange protocols , 1998 .

[16]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[17]  Marc Girault,et al.  Self-Certified Public Keys , 1991, EUROCRYPT.