Journal of Systems Engineering and Electronics ›› 2012, Vol. 34 ›› Issue (6): 1258-1265.doi: 10.3969/j.issn.1001-506X.2012.06.32

Previous Articles     Next Articles

Identity-based inter-domain authentication and key agreement protocol

PANG Liao-jun1,2, XU Yin-yu2, PEI Qing-qi3, LI Hui-xian4, WANG Yu-min2   

  1. 1. School of Life Sciences and Technology, Xidian University, Xi’an 710071, China;
    2. Key Laboratory of Computer Network and Information Security, the Ministry of Education, Xidian University, Xi’an 710071, China; 
    3. School of Telecommunications Engineering, Xidian University, Xi’an 710071, China;
    4. School of Computer Science and Technology, Northwestern Polytechnical University, Xi’an 710072, China
  • Online:2012-06-18 Published:2010-01-03

Abstract:

Derived from Shamir’s secret sharing idea, an identity-based inter-domain authentication and key agreement protocol is proposed. The protocol requires all nodes of a domain to participate the generation of the shared key, thus two knotty problems that the reliability of the representative nodes of the domains cannot be guaranteed and the efficiency of key agreement is very low are solved when using the existing two-party key agreement  protocols for inter-domain authentication and key agreement. The correctness and security analyses show that this protocol meets not only the basic security properties of the key agreement, but also data confidentiality, data integrity, resistance to impersonating the representative nodes and so on. Compared with the existing two-party key agreement protocols in inter-domain key agreement, the proposed protocol is less in communication and computation, and at the same time, it improves the participation of the common nodes of the domains in the process of key agreement.

[an error occurred while processing this directive]