A novel pairing-free certificateless authenticated key agreement protocol with provable security

Haiyan SUN, Qiaoyan WEN, Hua ZHANG, Zhengping JIN

PDF(428 KB)
PDF(428 KB)
Front. Comput. Sci. ›› 2013, Vol. 7 ›› Issue (4) : 544-557. DOI: 10.1007/s11704-013-2305-1
RESEARCH ARTICLE

A novel pairing-free certificateless authenticated key agreement protocol with provable security

Author information +
History +

Abstract

Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap Diffie- Hellman (GDH) assumption. Furthermore, the proposed protocol is very efficient.

Keywords

attacks / pairings / eCK model / provable security / certificateless authenticated key agreement

Cite this article

Download citation ▾
Haiyan SUN, Qiaoyan WEN, Hua ZHANG, Zhengping JIN. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front Comput Sci, 2013, 7(4): 544‒557 https://doi.org/10.1007/s11704-013-2305-1

References

[1]
Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47-53
CrossRef Google scholar
[2]
Al-Riyami S, Paterson K G. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452-473
CrossRef Google scholar
[3]
Wang S, Cao Z, Dong X. Certificateless authenticated key agreement based on theMTI/CO protocol. Journal of Information and Computational Science, 2006, 3(3): 575-581
[4]
Shi Y, Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 2007, 12(1): 71-74
CrossRef Google scholar
[5]
Luo M, Wen Y, Zhao H. An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: Proceedings of the 9th International Conference for Young Computer Scientists. 2008, 1577-1582
[6]
Mandt T, Tan C. Certificateless authenticated two-party key agreement protocols. Lecture Notes in Computer Science, 2007, 4435: 37-44
CrossRef Google scholar
[7]
Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications, 2008, 31(10): 2142-2149
CrossRef Google scholar
[8]
Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. Lecture Notes in Computer Science, 2009, 5922: 57-71
CrossRef Google scholar
[9]
Lippold G, Boyd C, Nieto González J. Strongly secure certificateless key agreement. Lecture Notes in Computer Science, 2009, 5671: 206-230
CrossRef Google scholar
[10]
Zhang L, Zhang F, Wu Q, Domingo-Ferrer J. Simulatable certificateless two party authenticated key agreement protocol. Information Sciences, 2010, 180(6): 1020-1030
CrossRef Google scholar
[11]
He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53
CrossRef Google scholar
[12]
Aranha D, Faz-Hernández A, López J, Rodríguez-Henríquez F. Faster implementation of scalar multiplication on Koblitz curves. In: Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America. 2012, 177-193
[13]
Aranha D, Karabina K, Longa P, Gebotys C, López J. Faster explicit formulas for computing pairings over ordinary curves. Lecture Notes in Computer Science, 2011, 6632: 48-68
CrossRef Google scholar
[14]
Hou M, Xu Q. A two-party certificateless authenticated key agreement protocol without pairing. In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. 2009, 412-416
[15]
He D, Chen Y, Chen J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221-230
CrossRef Google scholar
[16]
He D, Chen Y, Chen J, Zhang R, Han W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11-12): 3143-3152
CrossRef Google scholar
[17]
Xiong H, Wu Q, Chen Z. Toward pairing-free certificateless authenticated key exchanges. Lecture Notes in Computer Science, 2011, 7001: 79-94
CrossRef Google scholar
[18]
Geng M, Zhang F. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security. 2009, 208-212
CrossRef Google scholar
[19]
Yang G, Tan C. Strongly secure certificateless key exchange without pairing. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 2011, 71-79
[20]
He D, Padhye S, Chen J. An efficient certificateless two-party authenticated key agreement protocol. Computers and Mathematics with Applications, 2012, 64(6): 1914-1926
CrossRef Google scholar
[21]
Bellare M, Rogaway P. Entity authentication and key distribution. Lecture Notes in Computer Science, 1993, 773: 232-249
CrossRef Google scholar
[22]
Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. Lecture Notes in Computer Science, 2001, 2045: 453-474
CrossRef Google scholar
[23]
LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. In: Proceedings of the 1st International Conference on Provable Security. 2007, 1-16
CrossRef Google scholar
[24]
Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. Lecture Notes in Computer Science, 2005, 3788: 585-604
CrossRef Google scholar
[25]
Boneh D, Gentry C, Lynn B, Shacham H. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6(2): 1-10

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
AI Summary AI Mindmap
PDF(428 KB)

Accesses

Citations

Detail

Sections
Recommended

/