Abstract
Certificateless authenticated key agreement (CL-AKA) protocols have been studied a great deal since they neither suffer from a heavy certificate management burden nor have the key escrow problem. Recently, many efficient CL-AKA protocols without pairings have been built. However, these pairing-free CL-AKA protocols are either not proved in any formal security model or proved under the gap Diffie-Hellman (GDH) assumption, a non-standard and strong assumption. With available implementation technologies, pairings are needed to realize the GDH assumption, which means that these pairing-free CL-AKA protocols are not pure pairing-free. Furthermore, these protocols are insecure in the strengthened eCK (seCK) model, which encompasses the eCK model and considers leakages on intermediate results. In this paper, we present a pure pairing-free CL-AKA protocol, which is provably secure in the seCK model under the standard computational Diffie-Hellman (CDH) assumption. Compared with the existing CL-AKA protocols, the proposed protocol has advantage over them in security or efficiency.
摘要
创新点
本文提出了一个基于CDH假设的seCK安全的无对的无证书认证密钥协商协议。首先解决了现有的无对的无证书认证密钥协商协议仅基于GDH假设 (一个非标准的且强的假设) 的问题。其次, 解决了现有的无对的无证书认证密钥协商协议不能够满足seCK安全性(seCK安全模型不仅包含了eCK模型, 而且捕捉了临时中间结果泄露抵抗的安全性)的问题。与现存的无证书认证密钥协商协议相比较, 此协议有着安全性或效率的优势。
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of the 4th Annual International Cryptology Conference, Santa Barbara, 1984. 47–53
Al-Riyami S, Paterson K G. Certificateless public key cryptography. In: Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, 2003. 452–473
Li H, Wu C K. CMQV+: an authenticated key exchange protocol from CMQV. Sci China Inf Sci, 2012, 55: 1666–1674
Ni L, Chen G L, Li J H, et al. Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci China Inf Sci, 2013, 56: 082113
Wang S B, Cao Z F, Dong X. Certificateless authenticated key agreement based on the MTI/CO protocol. J Inf Comput Sci, 2006, 3: 575–581
Shi Y J, Li J H. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan Univ J Nat Sci, 2007, 12: 71–74
Luo M, Wen Y Y, Zhao H. An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: Proceedings of the 9th International Conference for Young Computer Scientists, Hunan, 2008. 1577–1582
Mandt T K, Tan C H. Certificateless authenticated two-party key agreement protocols. In: Proceedings of the 11th Asian Computing Science Conference, Tokyo, 2006. 37–44
Wang F J, Zhang Y Q. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Comput Commun, 2008, 31: 2142–2149
Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. In: Proceedings of 10th International Conference on Cryptology in India, New Delhi, 2009. 57–71
Lippold G, Boyd C, Manuel Gonzalez Nieto J. Strongly secure certificateless key agreement. In: Proceedings of 3rd International Conference on Pairing-Based Cryptography, Palo Alto, 2009. 206–230
Zhang L, Zhang F T, Wu Q H, et al. Simulatable certificateless two party authenticated key agreement protocol. Inf Sci, 2010, 180: 1020–1030
He D J, Chen C, Chan S, et al. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans Wirel Commun, 2012, 11: 48–53
Hou M B, Xu Q L. A two-party certificateless authenticated key agreement protocol without pairing. In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, 2009. 412–416
He D B, Chen Y T, Hu J. A pairing-free certificateless authenticated key agreement protocol. Int J Commun Syst, 2012, 25: 221–230
He D B, Chen Y T, Chen J H, et al. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math Comput Model, 2011, 54: 3143–3152
Xiong H, Wu Q H, Chen Z. Toward pairing-free certificateless authenticated key exchanges. In: Proceedings of 14th International Conference on Information Security, Xi’an, 2011. 79–94
Geng M M, Zhang F T. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security, Jinan, 2009. 208–212
He D B, Padhye S, Chen J H. An efficient certificateless two-party authenticated key agreement protocol. Comput Math Appl, 2012, 64: 1914–1926
Yang G M, Tan C H. Strongly secure certificateless key exchange without pairing. In: Proceedings of the 6th ACM Symposium on Information Computer and Communications Security, New York, 2011. 71–79
Sun H Y, Wen Q Y, Zhang H, et al. A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices. Inf Technol Control, 2013, 42: 113–123
Sun H Y, Wen Q Y, Zhang H, et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front Comput Sci, 2013, 7: 544–557
Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of 13th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1993. 232–249
Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. In: Proceedings of 6th IMA International Conference on Cryptography and Coding. Berlin: Springer-Verlag, 1997. 30–45
Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, 2001. 453–474
LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. In: Proceedings of 1st International Conference on Provable Security. Berlin: Springer-Verlag, 2007. 1–16
Sarr A P, Elbaz-Vincent P, Bajard J. A new security model for authenticated key agreement. In: Proceedings of 7th International Conference on Security and Cryptography for Networks, Amalfi, 2010. 219–234
Boneh D, Gentry C, Lynn B, et al. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6: 1–11
Cash D, Kiltz E, Shoup V. The twin Diffie-Hellman problem and applications. In: Proceedings of 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, 2008. 127–145
Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. J Cryptol, 2000, 13: 361–369
Shamus Software Ltd. Miracl library. http://www.certivox.com/miracl/
The Certicom Corporation. SEC2: Recommended domain parameters. Version 1.0, 2000
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sun, H., Wen, Q. & Li, W. A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci. China Inf. Sci. 59, 32109 (2016). https://doi.org/10.1007/s11432-015-5303-0
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-015-5303-0