Certificateless authenticated two-party key agreement Protocols

被引:0
|
作者
Mandt, Tarjei K. [1 ]
Tan, Chik How [1 ]
机构
[1] Gjovik Univ Coll, Dept Comp Sci & Media Technol, Norwegian Informat Secur Lab, N-2802 Gjovik, Norway
关键词
certificateless public key cryptography; authenticated key agreement; bilinear map;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In their seminal paper on certificateless public key cryptography, Al-Riyami and Paterson (AP) proposed a certificateless authenticated key agreement protocol. Key agreement protocols are one of the fundamental primitives of cryptography, and allow users to establish session keys securely in the presence of an active adversary. AP's protocol essentially requires each party to compute four bilinear pairings. Such operations can be computationally expensive, and should therefore be used moderately in key agreement. In this paper, we propose a new certificateless authenticated two-party key agreement protocol that only requires each party to compute two pairings. We analyze the security of the protocol and show that it achieves the desired security attributes. Furthermore, we show that our protocol can be used to establish keys between users of different key generation centers.
引用
收藏
页码:37 / 44
页数:8
相关论文
共 50 条
  • [1] A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
    Swanson, Colleen
    Jao, David
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 57 - +
  • [2] Simulatable certificateless two-party authenticated key agreement protocol
    Zhang, Lei
    Zhang, Futai
    Wu, Qianhong
    Domingo-Ferrer, Josep
    [J]. INFORMATION SCIENCES, 2010, 180 (06) : 1020 - 1030
  • [3] An efficient certificateless two-party authenticated key agreement protocol
    He, Debiao
    Padhye, Sahadeo
    Chen, Jianhua
    [J]. COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 64 (06) : 1914 - 1926
  • [5] Certificateless-based two-party authenticated Key agreement Protocols in a Multiple PKG Environment
    Pan Jin
    Liu Xiaoqiong
    Xie Minghui
    Liu Qiong
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2364 - 2367
  • [6] Certificateless two-party authenticated key agreement scheme for smart grid
    Deng, Lunzhi
    Gao, Ronghai
    [J]. Information Sciences, 2021, 543 : 143 - 156
  • [7] Certificateless two-party authenticated key agreement scheme for smart grid
    Deng, Lunzhi
    Gao, Ronghai
    [J]. INFORMATION SCIENCES, 2021, 543 : 143 - 156
  • [8] Two-party certificateless authenticated key agreement protocol with enhanced security
    Wu Tao
    Jing Xiaojun
    [J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26 (01) : 12 - 20
  • [9] Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    [J]. 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 308 - 311
  • [10] A Two-Party Certificateless Authenticated Key Agreement Protocol without Pairing
    Hou, Mengbo
    Xu, Qiuliang
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 412 - 416