We define a security model to capture some adaptive security for identity-based authenticated key agreement with multiple private key generators (PKGs). Previous researches assume that a party is statically bound to its PKG. In our model, an adversary can adaptively control the binding between a party and a PKG, and moreover, the adversary is allowed to obtain private keys from different PKGs on the same identity. Based on this model, we propose an adaptively secure protocol under the gap Diffie-Hellman assumption in the random oracle model.
CITATION STYLE
Fujioka, A. (2017). Adaptive security in identity-based authenticated key agreement with multiple private key generators. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10418 LNCS, pp. 192–211). Springer Verlag. https://doi.org/10.1007/978-3-319-64200-0_12
Mendeley helps you to discover research relevant for your work.