Two non-interactive key agreement protocols under certificateless scenarios

被引:0
|
作者
Sang, Yongxuan [1 ]
Zhang, Lili [2 ]
You, Lin [1 ]
Li, Zhongwen [3 ]
机构
[1] School of Telecommunication Engineering, Hangzhou Dianzi University, China
[2] Information Technology Tnstitute, Huanghe S and T College, China
[3] Information science and technology college, Chengdu University, China
关键词
Access control - Security systems;
D O I
10.4156/ijact.vol4.issue6.38
中图分类号
学科分类号
摘要
Key agreement protocol is one of the fundamental primitives of cryptography. It allows two or more parties to establish secret keys securely in the presence of an eavesdropping adversary. In this paper, two certificateless non-interactive key agreement protocols were proposed under certificateless scenarios, which have obvious advantages in the amount of computation and communication. We perform a security analysis of the schemes. We also show that the second protocol can be used to establish keys between members of distinct domains (under different KGCs). The proposed schemes can be used to construct secret sharing scheme.
引用
收藏
页码:331 / 337
相关论文
共 50 条
  • [1] A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks
    Bala, Suman
    Verma, Anil K.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2016, 21 (02) : 140 - 155
  • [2] Certificateless Key Agreement Protocols under Strong Models
    Goya, Denise H.
    Nakamura, Dionathan
    Terada, Routo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10): : 1822 - 1832
  • [3] Certificateless Non-Interactive Key Exchange Protocol without Pairings
    Wei, Yun
    Wei, Fushan
    Ma, Chuangui
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 31 - 42
  • [4] Certificateless authenticated two-party key agreement Protocols
    Mandt, Tarjei K.
    Tan, Chik How
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 37 - 44
  • [5] Efficient and Non-Interactive Hierarchical Key Agreement in WSNs
    Kim, Hyunsung
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 159 - 170
  • [6] An efficient and non-interactive hierarchical key agreement protocol
    Guo, Hua
    Mu, Yi
    Li, Zhoujun
    Zhang, Xiyong
    COMPUTERS & SECURITY, 2011, 30 (01) : 28 - 34
  • [7] On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
    Guobin Zhu
    Hu Xiong
    Zhiguang Qin
    Wireless Personal Communications, 2014, 74 : 883 - 889
  • [8] Non-Interactive Zero-Knowledge and applications: Two round authenticated key agreement
    Saxena, A
    Soh, B
    2005 13TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS JOINTLY HELD WITH THE 2005 7TH IEEE MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS 1 AND 2, 2005, : 722 - 726
  • [9] A Lightweight Certificateless Non-interactive Authentication and Key Exchange Protocol for IoT Environments
    Pan, Menghan
    He, Daojing
    Li, Xuru
    Chan, Sammy
    Panaousis, Emmanouil
    Gao, Yun
    26TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2021), 2021,
  • [10] On the Security of an Efficient and Non-interactive Hierarchical Key Agreement Protocol
    Zhu, Guobin
    Xiong, Hu
    Qin, Zhiguang
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 74 (02) : 883 - 889