2015
DOI: 10.1002/sec.1172
|View full text |Cite
|
Sign up to set email alerts
|

A resilient identity-based authenticated key exchange protocol

Abstract: This paper presents a new security notion for key exchange (KE) protocols called resiliency. That is, if a shared secret between a group of parties is compromised or leaked, they can generate another completely new shared secret without the need to set up a new KE session. We present an identity‐based authenticated KE protocol that satisfies the resiliency security property. We prove that if an l‐bit shared secret key (SSK) is leaked, then two parties P1 and P2 can safely generate another shared secret SSK1 wi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 40 publications
0
14
0
Order By: Relevance
“…In this paper, we have studied the security of the IBAKE protocol in introduced in [7]. The authors claimed that their protocol is provably secure when during the key exchange session some secret bits are leaked.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…In this paper, we have studied the security of the IBAKE protocol in introduced in [7]. The authors claimed that their protocol is provably secure when during the key exchange session some secret bits are leaked.…”
Section: Resultsmentioning
confidence: 99%
“…For more details we refer the reader to [3]. Finally we state an important lemma that shows an important property used in [3] and [7].…”
Section: Quadratic Residues and Jacobi Symbol For Any Integermentioning
confidence: 99%
See 3 more Smart Citations