ID-based authenticated key agreement for low-power mobile devices

Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, In Seog Seo

    Research output: Contribution to journalConference articlepeer-review

    62 Citations (Scopus)

    Abstract

    In this paper we present an efficient ID-based authenticated key agreement (AKA) protocol by using bilinear maps, especially well suited to unbalanced computing environments: an ID-based AKA protocol for Server and Client. Particularly, considering low-power clients' devices, we remove expensive operations such as bilinear maps from a client side. To achieve our goal we combine two notions, key agreement and ID-based authenticryption in which only designated verifier (or Sever) can verify the validity of a given transcript. We prove the security of our ID-based AKA protocols in the random oracle model.

    Original languageEnglish
    Pages (from-to)494-505
    Number of pages12
    JournalLecture Notes in Computer Science
    Volume3574
    DOIs
    Publication statusPublished - 2005
    Event10th Australasian Conference on Information Security and Privacy, ACISP 2005 - Brisbane, Australia
    Duration: 2005 Jul 42005 Jul 6

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'ID-based authenticated key agreement for low-power mobile devices'. Together they form a unique fingerprint.

    Cite this