A novel pairing-free certificateless authenticated key agreement protocol with provable security

Haiyan SUN , Qiaoyan WEN , Hua ZHANG , Zhengping JIN

Front. Comput. Sci. ›› 2013, Vol. 7 ›› Issue (4) : 544 -557.

PDF (428KB)
Front. Comput. Sci. ›› 2013, Vol. 7 ›› Issue (4) : 544 -557. DOI: 10.1007/s11704-013-2305-1
RESEARCH ARTICLE

A novel pairing-free certificateless authenticated key agreement protocol with provable security

Author information +
History +
PDF (428KB)

Abstract

Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap Diffie- Hellman (GDH) assumption. Furthermore, the proposed protocol is very efficient.

Keywords

attacks / pairings / eCK model / provable security / certificateless authenticated key agreement

Cite this article

Download citation ▾
Haiyan SUN, Qiaoyan WEN, Hua ZHANG, Zhengping JIN. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front. Comput. Sci., 2013, 7(4): 544-557 DOI:10.1007/s11704-013-2305-1

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47-53

[2]

Al-Riyami S, Paterson K G. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452-473

[3]

Wang S, Cao Z, Dong X. Certificateless authenticated key agreement based on theMTI/CO protocol. Journal of Information and Computational Science, 2006, 3(3): 575-581

[4]

Shi Y, Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 2007, 12(1): 71-74

[5]

Luo M, Wen Y, Zhao H. An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: Proceedings of the 9th International Conference for Young Computer Scientists. 2008, 1577-1582

[6]

Mandt T, Tan C. Certificateless authenticated two-party key agreement protocols. Lecture Notes in Computer Science, 2007, 4435: 37-44

[7]

Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications, 2008, 31(10): 2142-2149

[8]

Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. Lecture Notes in Computer Science, 2009, 5922: 57-71

[9]

Lippold G, Boyd C, Nieto González J. Strongly secure certificateless key agreement. Lecture Notes in Computer Science, 2009, 5671: 206-230

[10]

Zhang L, Zhang F, Wu Q, Domingo-Ferrer J. Simulatable certificateless two party authenticated key agreement protocol. Information Sciences, 2010, 180(6): 1020-1030

[11]

He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 2012, 11(1): 48-53

[12]

Aranha D, Faz-Hernández A, López J, Rodríguez-Henríquez F. Faster implementation of scalar multiplication on Koblitz curves. In: Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America. 2012, 177-193

[13]

Aranha D, Karabina K, Longa P, Gebotys C, López J. Faster explicit formulas for computing pairings over ordinary curves. Lecture Notes in Computer Science, 2011, 6632: 48-68

[14]

Hou M, Xu Q. A two-party certificateless authenticated key agreement protocol without pairing. In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. 2009, 412-416

[15]

He D, Chen Y, Chen J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221-230

[16]

He D, Chen Y, Chen J, Zhang R, Han W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11-12): 3143-3152

[17]

Xiong H, Wu Q, Chen Z. Toward pairing-free certificateless authenticated key exchanges. Lecture Notes in Computer Science, 2011, 7001: 79-94

[18]

Geng M, Zhang F. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security. 2009, 208-212

[19]

Yang G, Tan C. Strongly secure certificateless key exchange without pairing. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 2011, 71-79

[20]

He D, Padhye S, Chen J. An efficient certificateless two-party authenticated key agreement protocol. Computers and Mathematics with Applications, 2012, 64(6): 1914-1926

[21]

Bellare M, Rogaway P. Entity authentication and key distribution. Lecture Notes in Computer Science, 1993, 773: 232-249

[22]

Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. Lecture Notes in Computer Science, 2001, 2045: 453-474

[23]

LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. In: Proceedings of the 1st International Conference on Provable Security. 2007, 1-16

[24]

Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. Lecture Notes in Computer Science, 2005, 3788: 585-604

[25]

Boneh D, Gentry C, Lynn B, Shacham H. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6(2): 1-10

RIGHTS & PERMISSIONS

Higher Education Press and Springer-Verlag Berlin Heidelberg

AI Summary AI Mindmap
PDF (428KB)

1212

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/