Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography

被引:22
|
作者
SHI Yijuan
机构
基金
中国国家自然科学基金;
关键词
key agreement; two party; certificateless public key encryption;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryp- tography. It combines the advantages of the identity-based cryp- tography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed. However, the key agreement in CL-PKE is seldom discussed. In this paper, we present a new certificateless two party authentication key agreement protocol and prove its security attributes. Compared with the existing protocol, our protocol is more efficient.
引用
收藏
页码:71 / 74
页数:4
相关论文
共 50 条
  • [21] An efficient protocol for two-party explicit authenticated key agreement
    Zheng, Minghui
    Zhou, Huihua
    Chen, Jing
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2954 - 2963
  • [22] Efficient Pairing-Free, Certificateless Two-Party Authenticated Key Agreement Protocol for Grid Computing
    Farouk, Amr
    Miri, Ali
    Fouad, Mohamed M.
    Abdelhafez, Ahmed A.
    2014 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND IT'S APPLICATIONS (DICTAP), 2014, : 279 - 284
  • [23] A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks
    Bala, Suman
    Verma, Anil K.
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2016, 21 (02) : 140 - 155
  • [24] An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 295 - 302
  • [25] A new two-party identity-based authenticated key agreement
    McCullagh, N
    Barreto, PSLM
    TOPICS IN CRYPTOLOGY - CT-RSA 2005, PROCEEDINGS, 2005, 3376 : 262 - 274
  • [26] Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message
    Xie, Yong
    Wu, Libing
    Zhang, Yubo
    Xu, Zhiyan
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 244 - 254
  • [27] An optimal round two-party password-authenticated key agreement protocol
    Strangio, Maurizio A.
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 216 - 223
  • [28] Two improved two-party identity-based authenticated key agreement protocols
    Holbl, Marko
    Welzer, Tatjana
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1056 - 1060
  • [29] A Certificateless Two-Party Key Agreement Protocol from Challenge-Response Signatures
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [30] Authenticated Key Agreement protocol for Virtual Private Network based on Certificateless Cryptography
    Eldewahi, Abeer
    Basheir, Eihab
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013, : 269 - 273