We use cookies to improve your experience with our site.

Indexed in:

SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.

Submission System
(Author / Reviewer / Editor)
Sheng-Li Liu, Fang-Guo Zhang, Ke-Fei Chen. Authenticating Tripartite Key Agreement Protocol with Pairings[J]. Journal of Computer Science and Technology, 2004, 19(2).
Citation: Sheng-Li Liu, Fang-Guo Zhang, Ke-Fei Chen. Authenticating Tripartite Key Agreement Protocol with Pairings[J]. Journal of Computer Science and Technology, 2004, 19(2).

Authenticating Tripartite Key Agreement Protocol with Pairings

More Information
  • Published Date: March 14, 2004
  • In this paper, an authenticated tripartite key agreement protocol is proposed, which is an ID-based one with pairings. This protocol involves only one round. The authenticity of the protocol is assured by a special signature scheme, so that messages carrying the information of two ephemeral keys can be broadcasted authentically by an entity. Consequently, one instance of the protocol results in eight session keys for three entities. In other word, one instance of the protocol generates a session key, which is eight times longer than those obtained from traditional key agreement protocols. Security attributes of the protocol are presented, and the computational overhead and bandwidth of the broadcast messages are analyzed as well.
  • Related Articles

    [1]Zhen Zhao, Bao-Cang Wang, Wen Gao. Identity-Based Encryption with Equality Test Supporting Accountable Authorization in Cloud Computing[J]. Journal of Computer Science and Technology, 2025, 40(1): 215-228. DOI: 10.1007/s11390-024-2933-y
    [2]Qi-Qi Lai, Bo Yang, Yong Yu, Zhe Xia, Yan-Wei Zhou, Yuan Chen. Updatable Identity-Based Hash Proof System Based on Lattices and Its Application to Leakage-Resilient Public-Key Encryption Schemes[J]. Journal of Computer Science and Technology, 2018, 33(6): 1243-1260. DOI: 10.1007/s11390-018-1885-5
    [3]Meng-Jun Qin, Yun-Lei Zhao, Zhou-Jun Ma. Practical Constant-Size Ring Signature[J]. Journal of Computer Science and Technology, 2018, 33(3): 533-541. DOI: 10.1007/s11390-018-1838-z
    [4]Jun-Zuo Lai, Wen-Tao Zhu, Robert H. Deng, Sheng-Li Liu, Wei-Dong Kou. New Constructions for Identity-Based Unidirectional Proxy Re-Encryption[J]. Journal of Computer Science and Technology, 2010, 25(4): 793-806. DOI: 10.1007/s11390-010-1062-y
    [5]Hai-Bo Tian, Willy Susilo, Yang Ming, Yu-Min Wang. A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles[J]. Journal of Computer Science and Technology, 2008, 23(5): 832-842.
    [6]Jie Tian, Liang Li, Xin Yang. Fingerprint-Based Identity Authentication and Digital Media Protection in Network Environment[J]. Journal of Computer Science and Technology, 2006, 21(5): 861-870.
    [7]Lei Hu, Jun-Wu Dong, Ding-Yi Pei. Implementation of Cryptosystems Based on Tate Pairing[J]. Journal of Computer Science and Technology, 2005, 20(2).
    [8]Li Tianzhu. Object Identity in Database Systems[J]. Journal of Computer Science and Technology, 1995, 10(4): 380-384.
    [9]Zhang Yaoxue, Shi Meilin, Norio Shiratori. A Knowledge-Based Specification Technique for Protocol Development[J]. Journal of Computer Science and Technology, 1993, 8(2): 92-96.
    [10]Ma Songde, Wei Guoqing, Huang Jinfeng. Segment Based Camera Calibration[J]. Journal of Computer Science and Technology, 1993, 8(1): 11-16.

Catalog

    Article views (0) PDF downloads (1866) Cited by()
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return