ID-based authenticated key agreement for low-power mobile devices

Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo

Research output: Contribution to journalConference article

41 Citations (Scopus)

Abstract

In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments: an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, key agreement and ID-based authenticryption in which only designated verifier (or Sever) can verify the validity of a given transcript. We prove the security of our ID-based AKA protocols in the random oracle model.

Original languageEnglish
Pages (from-to)494-505
Number of pages12
JournalLecture Notes in Computer Science
Volume3574
DOIs
Publication statusPublished - 2005
Event10th Australasian Conference on Information Security and Privacy, ACISP 2005 - Brisbane, Australia
Duration: 2005 Jul 42005 Jul 6

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'ID-based authenticated key agreement for low-power mobile devices'. Together they form a unique fingerprint.

  • Cite this