Cryptology ePrint Archive: Report 2007/018
Strongly-Secure Identity-based Key Agreement and Anonymous Extension
Sherman S.M. Chow and Kim-Kwang Raymond Choo
Abstract: We study the provable security of identity-based (ID-based) key agreement protocols. Although several published protocols have been proven secure in the random oracle model, only a weak adversarial model is considered -- the adversary is not allowed to ask Session-Key Reveal queries that will allow the adversary to learn previously established session keys. Recent research efforts devoted to providing a stronger level of security require strong assumptions, such as assuming that the simulator has access to a non-existential computational or decisional oracle. In this work, we propose an ID-based key agreement protocol and prove its security in the widely accepted indistinguishability-based model of Canetti and Krawczyk. In our proof, the simulator does not require access to any non-existential computational or decisional oracle. We then extend our basic protocol to support ad-hoc anonymous key agreement with bilateral privacy. To the best of our knowledge, this is the first protocol of its kind as previously published protocols are for fixed group and provide only unilateral privacy (i.e., only one of the protocol participants enjoy anonymity).
Category / Keywords: public-key cryptography / Key agreement, provable security, reveal query, identity-based cryptography, anonymity
Publication Info: The abridged version of this paper appears in the proceedings of Information Security Conference (ISC 2007), volume 4779 of Lecture Notes in Computer Science, pages 315-332.
Date: received 21 Jan 2007, last revised 3 Jan 2008
Contact author: schow at cs nyu edu
Available formats: Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20080103:075535 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]