Identity-Based Key Agreement Protocols Sample Contracts

Identity-based Key Agreement Protocols From Pairings
Identity-Based Key Agreement Protocols • January 30th, 2008

– H2(Si): Algorithm A maintains an initially empty list Hlist with entries of the form (Su, mu, Ru, wu). Algorithm A responds to the query in the following way.

AutoNDA by SimpleDocs
Identity-Based Key Agreement Protocols in a Multiple PKG Environment×
Identity-Based Key Agreement Protocols • March 23rd, 2005

Abstract. To date, most identity-based key agreement protocols are based on a single PKG (Private Key Generator) environment. In 2002, Chen and Kudla pro- posed an identity-based key agreement protocol for a multiple PKG environment, where each PKG shares identical system parameters but possesses a distinct mas- ter key. However, it is more realistic to assume that each PKG uses different system parameters. In this paper, we propose a new two party key agreement protocol between users belonging to different PKGs that do not share system pa- rameters. We also extend this protocol to a tripartite key agreement protocol. Our two party protocol requires the same amount of pairing computation as Smart’s protocol for a single PKG environment and provides PKG forward secrecy. We show that the proposed key agreement protocols satisfy every security require- ments of key agreement protocols.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!