ID-based authenticated key agreement for low-power mobile devices

Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo

Research output: Chapter in Book/Report/Conference proceedingConference contribution

36 Citations (Scopus)

Abstract

In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments: an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, key agreement and ID-based authenticryption in which only designated verifier (or Sever) can verify the validity of a given transcript. We prove the security of our ID-based AKA protocols in the random oracle model.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science
EditorsC. Boyd, J.M. Gonzales-Nieto
Pages494-505
Number of pages12
Volume3574
Publication statusPublished - 2005
Event10th Australasian Conference on Information Security and Privacy, ACISP 2005 - Brisbane, Australia
Duration: 2005 Jul 42005 Jul 6

Other

Other10th Australasian Conference on Information Security and Privacy, ACISP 2005
CountryAustralia
CityBrisbane
Period05/7/405/7/6

Fingerprint

Mobile devices
Network protocols
Servers

ASJC Scopus subject areas

  • Computer Science (miscellaneous)

Cite this

Choi, K. Y., Hwang, J. Y., Lee, D. H., & Seo, I. S. (2005). ID-based authenticated key agreement for low-power mobile devices. In C. Boyd, & J. M. Gonzales-Nieto (Eds.), Lecture Notes in Computer Science (Vol. 3574, pp. 494-505)

ID-based authenticated key agreement for low-power mobile devices. / Choi, Kyu Young; Hwang, Jung Yeon; Lee, Dong Hoon; Seo, In Seog.

Lecture Notes in Computer Science. ed. / C. Boyd; J.M. Gonzales-Nieto. Vol. 3574 2005. p. 494-505.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Choi, KY, Hwang, JY, Lee, DH & Seo, IS 2005, ID-based authenticated key agreement for low-power mobile devices. in C Boyd & JM Gonzales-Nieto (eds), Lecture Notes in Computer Science. vol. 3574, pp. 494-505, 10th Australasian Conference on Information Security and Privacy, ACISP 2005, Brisbane, Australia, 05/7/4.
Choi KY, Hwang JY, Lee DH, Seo IS. ID-based authenticated key agreement for low-power mobile devices. In Boyd C, Gonzales-Nieto JM, editors, Lecture Notes in Computer Science. Vol. 3574. 2005. p. 494-505
Choi, Kyu Young ; Hwang, Jung Yeon ; Lee, Dong Hoon ; Seo, In Seog. / ID-based authenticated key agreement for low-power mobile devices. Lecture Notes in Computer Science. editor / C. Boyd ; J.M. Gonzales-Nieto. Vol. 3574 2005. pp. 494-505
@inproceedings{3e25e81a365d4baa9f2a31eb29bfc841,
title = "ID-based authenticated key agreement for low-power mobile devices",
abstract = "In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments: an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, key agreement and ID-based authenticryption in which only designated verifier (or Sever) can verify the validity of a given transcript. We prove the security of our ID-based AKA protocols in the random oracle model.",
author = "Choi, {Kyu Young} and Hwang, {Jung Yeon} and Lee, {Dong Hoon} and Seo, {In Seog}",
year = "2005",
language = "English",
volume = "3574",
pages = "494--505",
editor = "C. Boyd and J.M. Gonzales-Nieto",
booktitle = "Lecture Notes in Computer Science",

}

TY - GEN

T1 - ID-based authenticated key agreement for low-power mobile devices

AU - Choi, Kyu Young

AU - Hwang, Jung Yeon

AU - Lee, Dong Hoon

AU - Seo, In Seog

PY - 2005

Y1 - 2005

N2 - In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments: an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, key agreement and ID-based authenticryption in which only designated verifier (or Sever) can verify the validity of a given transcript. We prove the security of our ID-based AKA protocols in the random oracle model.

AB - In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments: an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, key agreement and ID-based authenticryption in which only designated verifier (or Sever) can verify the validity of a given transcript. We prove the security of our ID-based AKA protocols in the random oracle model.

UR - http://www.scopus.com/inward/record.url?scp=26444474509&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=26444474509&partnerID=8YFLogxK

M3 - Conference contribution

VL - 3574

SP - 494

EP - 505

BT - Lecture Notes in Computer Science

A2 - Boyd, C.

A2 - Gonzales-Nieto, J.M.

ER -