Reference Hub4
An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves

An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves

Daya Sagar Gupta
Copyright: © 2020 |Pages: 11
ISBN13: 9781522597155|ISBN10: 1522597158|EISBN13: 9781522597162
DOI: 10.4018/978-1-5225-9715-5.ch076
Cite Chapter Cite Chapter

MLA

Gupta, Daya Sagar. "An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves." Encyclopedia of Criminal Activities and the Deep Web, edited by Mehdi Khosrow-Pour D.B.A., IGI Global, 2020, pp. 1112-1122. https://doi.org/10.4018/978-1-5225-9715-5.ch076

APA

Gupta, D. S. (2020). An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves. In M. Khosrow-Pour D.B.A. (Ed.), Encyclopedia of Criminal Activities and the Deep Web (pp. 1112-1122). IGI Global. https://doi.org/10.4018/978-1-5225-9715-5.ch076

Chicago

Gupta, Daya Sagar. "An IBE-Based Authenticated Key Transfer Protocol on Elliptic Curves." In Encyclopedia of Criminal Activities and the Deep Web, edited by Mehdi Khosrow-Pour D.B.A., 1112-1122. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-5225-9715-5.ch076

Export Reference

Mendeley
Favorite

Abstract

The key exchanged using key transfer protocols is generally used for symmetric key encryption where this key is known as private key and used for both encryption as well as decryption. As we all know, many key transfer protocols including basic Diffie-Hellman protocol are proposed in the literature. However, many of these key transfer protocols either are proven insecure or had a burden of communication and computational cost. Therefore, a more secure and efficient key transfer protocol is needed. In this article, the author proposes an authenticated key transfer protocol that securely and efficiently negotiates a common session key between two end users. He calls this protocol as IBE-TP-AKE. This proposal is based on the elliptic-curve cryptography (ECC) and uses the idea of identity-based encryption (IBE) with pairing. The security of the proposed work is based on the hard problems of elliptic curve and their pairing. Further, the author has shown the security of his proposed protocol and proved it using the security properties discussed later.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.