An ID-based non-interactive tripartite key agreement protocol with K-resilience

Raylin Tso, Tsuyoshi Takagi, Takeshi Okamoto, Eiji Okamoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Key agreement protocols are designed so that two or more entities can establish a session key in order to communicate with confidentiality over an open network or to achieve a cryptographic goal such as data integrity. Till date, no (secure) tripartite key agreement protocol could provide authentication for entities without introducing certifications into the protocol or combining the protocol with a digital signature scheme. In addition, at least one-round of data transmission has been required for the current protocols. In this paper, we propose an ID-based tripartite key agreement protocol which is non-interactive. This scheme is secure against a collusion of a maximum of k entities. We also show how this protocol can be modified into an one-round tripartite key agreement protocol so that different session keys can be established in each run of the protocol.

Original languageEnglish
Title of host publicationThird IASTED International Conference on Communications and Computer Networks, CCN 2005
EditorsM.Y. Sanadidi
Pages38-42
Number of pages5
Publication statusPublished - Dec 1 2005
EventProceedings of the Third IASTED International Conference on Communications and Computer Networks, CCN 2005 - Marina del Rey, CA, United States
Duration: Oct 24 2005Oct 26 2005

Publication series

NameProceedings of the Third IASTED International Conference on Communications and Computer Networks, CCN 2005

Other

OtherProceedings of the Third IASTED International Conference on Communications and Computer Networks, CCN 2005
CountryUnited States
CityMarina del Rey, CA
Period10/24/0510/26/05

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Cite this

Tso, R., Takagi, T., Okamoto, T., & Okamoto, E. (2005). An ID-based non-interactive tripartite key agreement protocol with K-resilience. In M. Y. Sanadidi (Ed.), Third IASTED International Conference on Communications and Computer Networks, CCN 2005 (pp. 38-42). (Proceedings of the Third IASTED International Conference on Communications and Computer Networks, CCN 2005).