Two secure non-symmetric role Key-Agreement protocols

Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through elim...

Full description

Saved in:
Bibliographic Details
Main Authors: Ghoreishi, S., Isnin, I. F., Razak, S. A., Chizari, H.
Format: Article
Language:English
Published: Asian Research Publishing Network 2016
Subjects:
Online Access:http://eprints.utm.my/id/eprint/73748/1/SGhoreishi2016_TwoSecureNonSymmetricRole.pdf
http://eprints.utm.my/id/eprint/73748/
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84961575578&partnerID=40&md5=c4f170510f7a7fe7228786a56f9a4320
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Recently, some two-party Authenticated Key Agreement protocols over elliptic curve based algebraic groups, in the context of Identity-Based cryptography have been proposed. The main contribution of this category of protocols is to reduce the complexity of performing algebraic operations through eliminating the need to using Bilinear Pairings. In this paper, we proposed two novel Identity-Based Authenticated Key Agreement protocols over non-symmetric role participants without using Bilinear Pairings. The results show that our proposed schemes beside of supporting security requirements of Key Agreement protocols, require a subset of operations with low complexity in compare with related protocols in this scientific area.