IEEE Access (Jan 2024)

Strongly Secure Identity-Based Authenticated Key Agreement Protocol With Identity Concealment for Secure Communication in 5G Network

  • Huanhuan Lian,
  • Burong Kang,
  • Libao Yang

DOI
https://doi.org/10.1109/ACCESS.2024.3428547
Journal volume & issue
Vol. 12
pp. 98611 – 98622

Abstract

Read online

With the rocketing progress of the fifth generation (5G) mobile communication technology, identity-based authenticated key agreement (ID-AKA) protocol performs an increasingly significant part in secure communication. The majority of current efficient and secure ID-AKA protocols need to transmit each participant’s identity and public key information in the clear. Moreover, the long-term secret keys of participants are fully handled by the key generate center, which may give rise to new security concerns. To protect the privacy of user’s identity and ensure the security of the private keys, we propose a strongly secure identity-based authenticated key agreement scheme with identity concealment for 5G environment. The proposed scheme provides the property of non-full key escrow and eliminates the need of pairing operations. Furthermore, we show a modified security model for our protocol, and demonstrate the security analysis based on the hardness assumptions of the gap Diffie-Hellman problem and authentication encryption security. Finally, with the help of experiments and performance analysis, the detailed comparative results show that our scheme makes improvements in both efficiency and security while compared with recently proposed ID-AKA schemes.

Keywords