Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage

4Citations
Citations of this article
16Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In real applications of (public key-based) cryptosystems, hierarchical structures are often used to distribute the workload by delegating key generation. However, there is few previous study about such a hierarchical structure in the ID-based authenticated key exchange (AKE) scenario. In this paper, we introduce first hierarchical ID-based AKE resilient to ephemeral secret key leakage. Firstly, we provide a formal security model for hierarchical ID-based AKE. Our model is based on eCK security to guarantee resistance to leakage of ephemeral secret keys. We also propose an eCK secure hierarchical ID-based AKE protocol based on a hierarchical ID-based encryption. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Fujioka, A., Suzuki, K., & Yoneyama, K. (2010). Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6434 LNCS, pp. 164–180). Springer Verlag. https://doi.org/10.1007/978-3-642-16825-3_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free