iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://unpaywall.org/10.1007/S11432-015-5303-0
A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption | Science China Information Sciences Skip to main content
Log in

A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption

基于CDH假设的强安全的无对的无证书认证密钥协商协议

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Certificateless authenticated key agreement (CL-AKA) protocols have been studied a great deal since they neither suffer from a heavy certificate management burden nor have the key escrow problem. Recently, many efficient CL-AKA protocols without pairings have been built. However, these pairing-free CL-AKA protocols are either not proved in any formal security model or proved under the gap Diffie-Hellman (GDH) assumption, a non-standard and strong assumption. With available implementation technologies, pairings are needed to realize the GDH assumption, which means that these pairing-free CL-AKA protocols are not pure pairing-free. Furthermore, these protocols are insecure in the strengthened eCK (seCK) model, which encompasses the eCK model and considers leakages on intermediate results. In this paper, we present a pure pairing-free CL-AKA protocol, which is provably secure in the seCK model under the standard computational Diffie-Hellman (CDH) assumption. Compared with the existing CL-AKA protocols, the proposed protocol has advantage over them in security or efficiency.

摘要

创新点

本文提出了一个基于CDH假设的seCK安全的无对的无证书认证密钥协商协议。首先解决了现有的无对的无证书认证密钥协商协议仅基于GDH假设 (一个非标准的且强的假设) 的问题。其次, 解决了现有的无对的无证书认证密钥协商协议不能够满足seCK安全性(seCK安全模型不仅包含了eCK模型, 而且捕捉了临时中间结果泄露抵抗的安全性)的问题。与现存的无证书认证密钥协商协议相比较, 此协议有着安全性或效率的优势。

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of the 4th Annual International Cryptology Conference, Santa Barbara, 1984. 47–53

    Google Scholar 

  2. Al-Riyami S, Paterson K G. Certificateless public key cryptography. In: Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, 2003. 452–473

    Google Scholar 

  3. Li H, Wu C K. CMQV+: an authenticated key exchange protocol from CMQV. Sci China Inf Sci, 2012, 55: 1666–1674

    Article  MathSciNet  MATH  Google Scholar 

  4. Ni L, Chen G L, Li J H, et al. Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci China Inf Sci, 2013, 56: 082113

    Article  MathSciNet  Google Scholar 

  5. Wang S B, Cao Z F, Dong X. Certificateless authenticated key agreement based on the MTI/CO protocol. J Inf Comput Sci, 2006, 3: 575–581

    Google Scholar 

  6. Shi Y J, Li J H. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan Univ J Nat Sci, 2007, 12: 71–74

    Article  MathSciNet  Google Scholar 

  7. Luo M, Wen Y Y, Zhao H. An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: Proceedings of the 9th International Conference for Young Computer Scientists, Hunan, 2008. 1577–1582

    Google Scholar 

  8. Mandt T K, Tan C H. Certificateless authenticated two-party key agreement protocols. In: Proceedings of the 11th Asian Computing Science Conference, Tokyo, 2006. 37–44

    Google Scholar 

  9. Wang F J, Zhang Y Q. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Comput Commun, 2008, 31: 2142–2149

    Article  Google Scholar 

  10. Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. In: Proceedings of 10th International Conference on Cryptology in India, New Delhi, 2009. 57–71

    Google Scholar 

  11. Lippold G, Boyd C, Manuel Gonzalez Nieto J. Strongly secure certificateless key agreement. In: Proceedings of 3rd International Conference on Pairing-Based Cryptography, Palo Alto, 2009. 206–230

    Google Scholar 

  12. Zhang L, Zhang F T, Wu Q H, et al. Simulatable certificateless two party authenticated key agreement protocol. Inf Sci, 2010, 180: 1020–1030

    Article  MathSciNet  MATH  Google Scholar 

  13. He D J, Chen C, Chan S, et al. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans Wirel Commun, 2012, 11: 48–53

    Article  Google Scholar 

  14. Hou M B, Xu Q L. A two-party certificateless authenticated key agreement protocol without pairing. In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, 2009. 412–416

    Google Scholar 

  15. He D B, Chen Y T, Hu J. A pairing-free certificateless authenticated key agreement protocol. Int J Commun Syst, 2012, 25: 221–230

    Article  Google Scholar 

  16. He D B, Chen Y T, Chen J H, et al. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math Comput Model, 2011, 54: 3143–3152

    Article  MathSciNet  MATH  Google Scholar 

  17. Xiong H, Wu Q H, Chen Z. Toward pairing-free certificateless authenticated key exchanges. In: Proceedings of 14th International Conference on Information Security, Xi’an, 2011. 79–94

    Google Scholar 

  18. Geng M M, Zhang F T. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security, Jinan, 2009. 208–212

    Chapter  Google Scholar 

  19. He D B, Padhye S, Chen J H. An efficient certificateless two-party authenticated key agreement protocol. Comput Math Appl, 2012, 64: 1914–1926

    Article  MathSciNet  MATH  Google Scholar 

  20. Yang G M, Tan C H. Strongly secure certificateless key exchange without pairing. In: Proceedings of the 6th ACM Symposium on Information Computer and Communications Security, New York, 2011. 71–79

    Google Scholar 

  21. Sun H Y, Wen Q Y, Zhang H, et al. A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices. Inf Technol Control, 2013, 42: 113–123

    Google Scholar 

  22. Sun H Y, Wen Q Y, Zhang H, et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front Comput Sci, 2013, 7: 544–557

    Article  MathSciNet  Google Scholar 

  23. Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of 13th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1993. 232–249

    Google Scholar 

  24. Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. In: Proceedings of 6th IMA International Conference on Cryptography and Coding. Berlin: Springer-Verlag, 1997. 30–45

    Google Scholar 

  25. Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, 2001. 453–474

    Google Scholar 

  26. LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. In: Proceedings of 1st International Conference on Provable Security. Berlin: Springer-Verlag, 2007. 1–16

    Google Scholar 

  27. Sarr A P, Elbaz-Vincent P, Bajard J. A new security model for authenticated key agreement. In: Proceedings of 7th International Conference on Security and Cryptography for Networks, Amalfi, 2010. 219–234

    Google Scholar 

  28. Boneh D, Gentry C, Lynn B, et al. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6: 1–11

    Google Scholar 

  29. Cash D, Kiltz E, Shoup V. The twin Diffie-Hellman problem and applications. In: Proceedings of 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, 2008. 127–145

    Google Scholar 

  30. Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. J Cryptol, 2000, 13: 361–369

    Article  MATH  Google Scholar 

  31. Shamus Software Ltd. Miracl library. http://www.certivox.com/miracl/

  32. The Certicom Corporation. SEC2: Recommended domain parameters. Version 1.0, 2000

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiyan Sun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, H., Wen, Q. & Li, W. A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci. China Inf. Sci. 59, 32109 (2016). https://doi.org/10.1007/s11432-015-5303-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-015-5303-0

Keywords

关键词

Navigation