Identity-based key agreement with unilateral identity privacy using pairings.

Comley, Richard A. ORCID logoORCID:, Chen, Liqun, Tang, Qiang and Cheng, Zhaohui (2006) Identity-based key agreement with unilateral identity privacy using pairings. 2nd Information Security Practice and Experience Conference (ISPEC 2006), Hangzhou, China. Proceedings, Lecture Notes in Computer Science LNCS 3903/2006 . pp. 202-213. ISSN 978-3-540-33052-3 [Article] (doi:10.1007/11689522_19)


Common key agreement protocols assume that both parties have some knowledge of each others identity or the identity is exchanged without protection. There are many real-world situations where this is either not possible or not desirable, e.g. mobile networks. This paper investigates the user identity privacy in the protocols employing identity-based primitives from pairings. By considering both security strength and computation efficiency, an identity-based protocol is proposed using pairing which preserves both user identity privacy and high efficiency. The proposed key exchange system is formally analysed to confirm its rigour.

Item Type: Article
Research Areas: A. > School of Science and Technology > Computer and Communications Engineering
ISI Impact: 7
Item ID: 24
Useful Links:
Depositing User: Repository team
Date Deposited: 13 Oct 2008 12:53
Last Modified: 28 Nov 2019 10:49

Actions (login required)

View Item View Item


Activity Overview
6 month trend
6 month trend

Additional statistics are available via IRStats2.