Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography

被引:22
|
作者
SHI Yijuan
机构
基金
中国国家自然科学基金;
关键词
key agreement; two party; certificateless public key encryption;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
Certificateless public key cryptography was introduced to overcome the key escrow limitation of the identity-based cryp- tography. It combines the advantages of the identity-based cryp- tography and the traditional PKI. Many certificateless public key encryption and signature schemes have been proposed. However, the key agreement in CL-PKE is seldom discussed. In this paper, we present a new certificateless two party authentication key agreement protocol and prove its security attributes. Compared with the existing protocol, our protocol is more efficient.
引用
收藏
页码:71 / 74
页数:4
相关论文
共 50 条
  • [31] Identity-based authenticated key agreement protocol for two-party in the standard model
    Ren, Yong-Jun
    Wang, Jian-Dong
    Zhuang, Yi
    Wang, Jian
    Xu, Da-Zhuan
    Beijing Ligong Daxue Xuebao/Transaction of Beijing Institute of Technology, 2010, 30 (02): : 174 - 178
  • [32] Strongly Secure and Anonymous Two-Party Authenticated Key Agreement for Mobile Roaming Service
    Chen M.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2019, 47 (01): : 16 - 24
  • [33] Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys
    Islam, S. K. Hafizul
    Biswas, G. P.
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (04) : 2727 - 2750
  • [34] Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys
    SK Hafizul Islam
    G. P. Biswas
    Wireless Personal Communications, 2015, 82 : 2727 - 2750
  • [35] Certificateless public key cryptography
    Al-Riyami, SS
    Paterson, KG
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 452 - 473
  • [36] Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 574 - 577
  • [37] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng R.
    Wang L.
    International Journal of Ad Hoc and Ubiquitous Computing, 2020, 34 (04): : 249 - 257
  • [38] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257
  • [39] Certificateless Authenticated Key Agreement for Decentralized WBANs
    Gervais, Mwitende
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 268 - 290
  • [40] On the Security of Certificateless Authenticated Key Agreement Protocol
    Hou Meng-bo
    Xu Qiu-liang
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 974 - 979