{"title":"On security enhancement of long-term private key for the tripartite authenticated key agreement protocol","authors":"M. Nomura, K. Nakamura","doi":"10.1109/ISITA.2008.4895437","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a scheme that enhances the security of long-term private key l<sub>ID</sub> used in the tripartite authenticated key agreement protocol. In this scheme, we use (H(l<sub>ID</sub>Pmacr)l<sub>ID</sub>)P (H: hash function) instead of l<sub>ID</sub>P (P: a rational point of the defined elliptic curve over F<sub>p</sub>) as a static public key and tau<sub>ID1</sub>, tau<sub>ID2</sub> as two ephemeral private keys. From this, even though the bit length of p (p's security parameter) is more lessened, we can preserve equal security to conventional schemes in respect of the secrecy of the long-term private key.","PeriodicalId":338675,"journal":{"name":"2008 International Symposium on Information Theory and Its Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Symposium on Information Theory and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISITA.2008.4895437","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we propose a scheme that enhances the security of long-term private key lID used in the tripartite authenticated key agreement protocol. In this scheme, we use (H(lIDPmacr)lID)P (H: hash function) instead of lIDP (P: a rational point of the defined elliptic curve over Fp) as a static public key and tauID1, tauID2 as two ephemeral private keys. From this, even though the bit length of p (p's security parameter) is more lessened, we can preserve equal security to conventional schemes in respect of the secrecy of the long-term private key.