scholarly journals An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices

2007 ◽  
Vol 378 (2) ◽  
pp. 198-207 ◽  
Author(s):  
Robert W. Zhu ◽  
Guomin Yang ◽  
Duncan S. Wong
2012 ◽  
Vol 35 (1) ◽  
pp. 340-347 ◽  
Author(s):  
Fagen Li ◽  
Muhammad Khurram Khan ◽  
Khaled Alghathbar ◽  
Tsuyoshi Takagi

Author(s):  
Luis Lizama-Pérez ◽  
J. Mauricio López

Post-quantum public cryptosystems introduced so far do not define an scalable public key infrastructure for the quantum era. We demonstrate here a public certification system based in Lizama’s non-invertible Key Exchange Protocol which can be used to implement a public key infrastructure (PKI), secure, scalable, interoperable and efficient. We show functionality of certificates across different certification domains. Finally, we discuss that non-invertible certificates can exhibit Perfect Forward Secrecy (PFS).


Author(s):  
Young Kyung Lee ◽  
Ji Eun Eom ◽  
Seung-Hyun Seo ◽  
Dong Hoon Lee

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Tsu-Yang Wu ◽  
Tung-Tso Tsai ◽  
Yuh-Min Tseng

The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards, based on the R-IDPKS, Wu et al. proposed a revocable ID-based AGKE (RID-AGKE) protocol, which adopted a passive detecting way to resist malicious participants. However, it needs three rounds and cannot identify malicious participants. In this paper, we fuse a noninteractive confirmed computation technique to propose the first two-round RID-AGKE protocol with identifying malicious participants, which is an active detecting way. We demonstrate that our protocol is a provably secure AGKE protocol with forward secrecy and can identify malicious participants. When compared with the recently proposed ID/RID-AGKE protocols, our protocol possesses better performance and more robust security properties.


Sign in / Sign up

Export Citation Format

Share Document