Toward pairing-free certificateless authenticated key exchanges

作者: Hu Xiong , Qianhong Wu , Zhong Chen

DOI: 10.1007/978-3-642-24861-0_6

关键词: Computer securityAuthenticationCertificate Management ProtocolCertificateless cryptographyAuthenticated Key ExchangeComputer sciencePairingKey (cryptography)Random oracleComputer security model

摘要: Certificateless authenticated key exchange (CL-AKE) protocols do not suffer from intricate certificate management or heavy trust reliance on a third party. Unfortunately, these advantages are partially counteracted in most CL-AKE which require expensive pairing operations. This paper proposes new protocol without requiring any operation during the execution, although map may be required to realize Decisional Diffie-Hellman (DDH) oracle security proof. With implicit authentication, we illustrate modular proofs model incorporating standard definitions of AKE and certificateless cryptography. Analysis shows that our is also efficient.

参考文章(33)
Weizhi Meng, Dieter Gollmann, Christian D Jensen, Jianying Zhou, None, Information and Communications Security ,(2008)
Caroline Kudla, Kenneth G. Paterson, Modular Security Proofs for Key Agreement Protocols Lecture Notes in Computer Science. pp. 549- 565 ,(2005) , 10.1007/11593447_30
Dario Fiore, Rosario Gennaro, Making the diffie-hellman protocol identity-based the cryptographers track at the rsa conference. pp. 165- 178 ,(2010) , 10.1007/978-3-642-11925-5_12
Tarjei K. Mandt, Chik How Tan, Certificateless authenticated two-party key agreement protocols ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues. pp. 37- 44 ,(2006) , 10.1007/978-3-540-77505-8_4
Colleen Swanson, David Jao, A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols international conference on cryptology in india. pp. 57- 71 ,(2009) , 10.1007/978-3-642-10628-6_4
Sattam S. Al-Riyami, Kenneth G. Paterson, Certificateless Public Key Cryptography international conference on the theory and application of cryptology and information security. pp. 452- 473 ,(2003) , 10.1007/978-3-540-40061-5_29
Wang Shengbao, Cao Zhenfu, Wang Licheng, Efficient certificateless authenticated key agreement protocol from pairings Wuhan University Journal of Natural Sciences. ,vol. 11, pp. 1278- 1282 ,(2006) , 10.1007/BF02829251
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Feng Bao, Robert H Deng, Huafei Zhu, None, Variations of Diffie-Hellman Problem international conference on information and communication security. ,vol. 2836, pp. 301- 312 ,(2003) , 10.1007/978-3-540-39927-8_28
Lei Zhang, Futai Zhang, Qianhong Wu, Josep Domingo-Ferrer, Simulatable certificateless two-party authenticated key agreement protocol Information Sciences. ,vol. 180, pp. 1020- 1030 ,(2010) , 10.1016/J.INS.2009.11.036