Citation: | REN J,LI M H,DU Y,et al. Identity-based authentication key agreement protocol for horizontal federated learning environment[J]. Journal of Beijing University of Aeronautics and Astronautics,2023,49(2):397-405 (in Chinese) doi: 10.13700/j.bh.1001-5965.2021.0217 |
In recent years, federated learning has received extensive attention in many fields, but this technology inevitably causes data transmission security problems. However, authentication and key agreement are important to ensure secure transmission and reliable communication between communicating entities. This study suggests a lightweight certificateless authentication and key agreement protocol that is identity-based and takes into account the data properties of horizontal federated learning. The participants need to register at the key generation center (KGC) and use public parameters to calculate their temporary keys and long-term keys which is to complete authentication and calculate the session key. Subsequently, the eCK model is used to prove the security of the protocol proposed in this paper. A thorough analysis shows that this protocol is appropriate for a single-server horizontal federated learning environment since it has full security features, low processing and communication costs.
[1] |
MCMAHAN H B, MOORE E, RAMAGE D, et al. Communication-efficient learning of deep networks from decentralized data[C]//20th International Conference on Artificial Intelligence and Statistics. Fort Lauderdale: PMLR, 2017: 1273-1282.
|
[2] |
SHAMIR A. Identity-based cryptosystems and signature schemes[C]//Advances in Cryptology. Berlin: Springer , 1985: 47-53.
|
[3] |
BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing[C]// Advances in Cryptology. 2001: 213-229.
|
[4] |
JEGADEESAN S, AZEES M, KUMAR P M, et al. An efficient anonymous mutual authentication technique for providing secure communication in mobile cloud computing for smart city applications[J]. Sustainable Cities and Society, 2019, 49: 101522. doi: 10.1016/j.scs.2019.101522
|
[5] |
BAKHTIARI-CHEHELCHESHMEH S, HOSSEINZADEH M. A new certificateless and secure authentication scheme for ad hoc networks[J]. Wireless Personal Communications, 2017, 94(4): 2833-2851. doi: 10.1007/s11277-016-3721-y
|
[6] |
WU L B, WANG J, RAYMOND CHOO K K, et al. An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network[J]. Journal of Information Security and Applications, 2017, 37: 112-121. doi: 10.1016/j.jisa.2017.10.003
|
[7] |
ZHU R W, YANG G M, WONG D S. An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices[J]. Theoretical Computer Science, 2007, 378(2): 198-207. doi: 10.1016/j.tcs.2007.02.021
|
[8] |
CAO X, KOU W, YU Y, et al. Identity-based authentication key agreement protocols without bilinear parings[J]. IEICE Transaction on Fundamentals, 2008, E91.A(12): 3833-3836. doi: 10.1093/ietfec/e91-a.12.3833
|
[9] |
CAO X F, KOU W D, DU X N. A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges[J]. Information Sciences, 2010, 180(15): 2895-2903. doi: 10.1016/j.ins.2010.04.002
|
[10] |
ISLAM S H, BISWAS G P. An improved pairing-free identity-based authenticated key agreement protocol based on ECC[J]. Procedia Engineering, 2012, 30: 499-507. doi: 10.1016/j.proeng.2012.01.890
|
[11] |
DANIEL R M, RAJSINGH E B, SILAS S. An efficient ECK secure certificateless authenticated key agreement scheme with security against public key replacement attacks[J]. Journal of Information Security and Applications, 2019, 47: 156-172. doi: 10.1016/j.jisa.2019.05.003
|
[12] |
LAMACCHIA B, LAUTER K, MITYAGIN A. Stronger security of authenticated key exchange[C]//International Conference on Provable Security. Berlin: Springer, 2007: 1-16.
|
[13] |
DANIEL R M, RAJSINGH E B, SILAS S. An efficient ECK secure identity based two party authenticated key agreement scheme with security against active adversaries[J]. Information and Computation, 2020, 275: 104630. doi: 10.1016/j.ic.2020.104630
|
[14] |
XIE Y, WU L B, SHEN J, et al. Efficient two-party certificateless authenticated key agreement protocol under GDH assumption[J]. International Journal of Ad Hoc and Ubiquitous Computing, 2019, 30(1): 11. doi: 10.1504/IJAHUC.2019.097093
|
[15] |
郭松辉, 牛小鹏, 王玉龙. 一种基于椭圆曲线的轻量级身份认证及密钥协商方案[J]. 计算机科学, 2015, 42(1): 137-141. doi: 10.11896/j.issn.1002-137X.2015.01.032
GUO S H, NIU X P, WANG Y L. Elliptic curve based light-weight authentication and key agreement scheme[J]. Computer Science, 2015, 42(1): 137-141(in Chinese). doi: 10.11896/j.issn.1002-137X.2015.01.032
|
[16] |
曹阳, 邓方安, 陈涛, 等. 一种基于身份可认证两方密钥协商方案[J]. 成都理工大学学报(自然科学版), 2016, 43(6): 757-761.
CAO Y, DENG F G, CHEN T, et al. A two-party key agreement scheme based on authenticated identity[J]. Journal of Chengdu University of Technology (Science & Technology Edition), 2016, 43(6): 757-761(in Chinese).
|
[17] |
周彦伟, 杨波, 张文政. 一种改进的无证书两方认证密钥协商协议[J]. 计算机学报, 2017, 40(5): 1181-1191. doi: 10.11897/SP.J.1016.2017.01181
ZHOU Y W, YANG B, ZHANG W Z. An improved two-party authenticated certificateless key agreement protocol[J]. Chinese Journal of Computers, 2017, 40(5): 1181-1191(in Chinese). doi: 10.11897/SP.J.1016.2017.01181
|