4.2 Article

Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks

Journal

Publisher

SAGE PUBLICATIONS INC
DOI: 10.1177/1550147718772545

Keywords

Authenticated key agreement; pairing-free; identity-based; connected and autonomous vehicles; eCK model

Funding

  1. National Natural Science Foundation of China (NSFC) [61402351]
  2. Fundamental Research Funds for the Central Universities [JB140116]
  3. Programme of Introducing Talents of Discipline to Universities (111 Project) [B16037, B08038]

Ask authors/readers for more resources

In vehicular ad hoc networks, establishing a secure channel between any two vehicles is fundamental. Authenticated key agreement is a useful mechanism, which can be used to negotiate a shared key for secure data transmission between authentic vehicles in vehicular ad hoc networks. Among the existing identity-based two-party authenticated key agreement protocols without pairings, there are only a few protocols that provide provable security in strong security models such as the extended Canetti-Krawczyk model. This article presents an efficient pairing-free identity-based one-round two-party authenticated key agreement protocol with provable security, which is more suitable for real-time application environments with highly dynamic topology such as vehicular ad hoc networks than the existing identity-based two-party authenticated key agreement protocols. The proposed protocol is proven secure under the passive and active adversaries in the extended Canetti-Krawczyk model based on the Gap Diffie-Hellman assumption. The proposed protocol can capture all essential security attributes including known-session key security, perfect forward secrecy, basic impersonation resistance, key compromise impersonation resistance, unknown key share resistance, no key control, and ephemeral secrets reveal resistance. Compared with the existing identity-based two-party authenticated key agreement protocols, the proposed protocol is superior in terms of computational cost and running time while providing higher security.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.2
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available