Integrating Identity-Based and Certificate-Based Authenticated Key Exchange Protocols
Loading...
Files
Date
Authors
Ustaoğlu, Berkant
Journal Title
Journal ISSN
Volume Title
Publisher
Open Access Color
BRONZE
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
Key establishment is becoming a widely deployed cryptographic primitive. As such, there has been extensive research on designing algorithms that produce shared secret keys. These protocols require parties to either hold certificates or rely on identity (ID)-based primitives to achieve authentication. Chain and cross certifications allow users trusting different certification authorities to interact. Similarly, there are methods to extend ID-based solutions across multiple key generation centers (KGC). However, there has been no dedicated work on interoperability between the two settings. A straightforward solution would require each user to maintain certificates and ID-based static keys to accommodate all peers. The cost of maintaining many secret keys; matching keys with protocols; and preventing undesired interference would arguably make such a solution impractical. In this work, we offer an alternative where a user needs to keep a single static key pair and can subsequently engage in a session key establishment with peers holding certificates or identity-based keys. Thus, the proposed solution has none of disadvantages of maintaining multiple static private keys. © 2011 Springer-Verlag.
Description
Keywords
Authenticated key establishment, Certificate-based protocols, ID-based protocols, Shared static state, Authentication, Authentication, Authenticated key establishment, Shared static state, Certificate-based protocols, ID-based protocols
Fields of Science
0211 other engineering and technologies, 0202 electrical engineering, electronic engineering, information engineering, 02 engineering and technology
Citation
Ustaoğlu, B., (2011). Integrating identity-based and certificate-based authenticated key exchange protocols. International Journal of Information Security, 10(4), 201-212. doi:10.1007/s10207-011-0136-3
WoS Q
Scopus Q

OpenCitations Citation Count
7
Volume
10
Issue
4
Start Page
201
End Page
212
PlumX Metrics
Citations
CrossRef : 7
Scopus : 11
Captures
Mendeley Readers : 14
Google Scholar™


