Two Party Certificateless Key Agreement Schemes
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [15]
  • |
  • Related [20]
  • |
  • Cited by
  • | |
  • Comments
    Abstract:

    A pairing-free certificateless two party key agreement scheme (CL-KA) is proposed. This work is able demonstrates all existing CL-KA schemes (except for Lippold’s scheme) are insecure in the eCK model. The scheme is secure in the eCK model as long as each party has at least one uncompromised secret. The scheme has proven to be secure in the random oracle model (ROM), assuming that the computational Diffie-Hellman assumption hold even if the key generation centre (KGC) learns the ephemeral secrets of both parties, or reveal secret values/replace public keys, but not both. The scheme eliminates pairing computation. It achieves efficiency in computational cost when compared with all the other known certificateless key agreement schemes. The scheme is more suitable for the restricted bandwidth of the communication environment, such as ad hoc networks, wireless sensors, and so on.

    Reference
    [1] Shamir A. Identity-Based cryptosystems and signature schemes. In: Proc. of the Crypto’84. LNCS 196, Berlin: Springer-Verlag, 1984. 47-53. [doi:10.1007/3-540-39568-7_5]
    [2] Al-Riyami SS, Paterson K. Certificateless public key cryptography. In: Laih CS, ed. Advances in Cryptology——Asiacrypt 2003. LNCS 2894, Heidelberg: Springer-Verlag, 2003. 452-473. [doi: 10.1007/978-3-540-40061-5_29]
    [3] Al-Riyami SS, Paterson KG. CBE from CL-PKE: A generic construction and efficient schemes. In: Vaudenay S, ed. Proc. of the PKC 2005. LNCS 3386, Berlin: Springer-Verlag, 2005. 398-415. [doi: 10.1007/978-3-540-30580-4_27]
    [4] Mandt TK. Certificateless authenticated two-party key agreement protocols [MS. Thesis]. University of Gjovik, 2006.
    [5] Wu CH, Chen ZX. A new efficient certificateless signcryption scheme. In: Proc. of the ISISE 2008. 2008. 661-664. [doi: 10.1109/ISISE.2008.206]
    [6] Wang SB, Cao ZF, Wang LC. Efficient certificateless authenticated key agreement protocol form pairings. Wuhan University Journal of Natural Sciences, 2006,11(5):1278-1282. [doi: 10.1007/BF02829251]
    [7] Shao ZH. Efficient authenticated key agreement protocol using self-certified public keys from pairings. Wuhan University Journal of Natural Sciences, 2005,10(1):267-270. [doi: 10.1007/BF02828666]
    [8] Xia LQ, Wang SB, Shen JJ, Xu GM. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. Wuhan University Journal of Natural Sciences, 2008,13(5):562-566. [doi: 10.1007/s11859-008-0510-9]
    [9] Swanson CM. Security in key agreement two-party certificateless schemes [MS. Thesis]. University of Waterloo, 2009.
    [10] Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. In: Proc. of the INDOCRYPT 2009. LNCS 5922, Berlin, Heidelberg: Springer-Verlag, 2009. 57-71. [doi: 10.1007/978-3-642-10628-6_4]
    [11] LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. Technical Report, 2006/073, 2006.
    [12] Lippold G, Boyd C, Nieto JG. Strongly secure certificateless key agreement. In: Proc. of the Pairing 2009. LNCS 5671, Berlin, Heidelberg: Springer-Verlag, 2009. 206-230. [doi: 10.1007/978-3-642-03298-1_14]
    [13] MIRACL. Multiprecision integer and rational arithmetic C/C++ library. http://indigo.ie/mscott/
    [14] Chen L, Cheng Z, Smart NP. Identity-Based key agreement protocols from pairings. Int’l Journal of Information Secure, 2007,6(4): 213-241. [doi: 10.1007/s10207-006-0011-9]
    [15] Zhang L, Zhang FT. A method to construct a class of certificateless signature schemes. Chinese Journal of Computers, 2009,32(5): 940-945 (in Chinese with English abstract). [doi: 10.3724/SP.J.1016.2009.00940]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

刘文浩,许春香.无证书两方密钥协商方案.软件学报,2011,22(11):2843-2852

Copy
Share
Article Metrics
  • Abstract:4466
  • PDF: 6748
  • HTML: 0
  • Cited by: 0
History
  • Received:May 24,2010
  • Revised:August 13,2010
You are the first2038061Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063