Part of the book series:Lecture Notes in Computer Science ((LNSC,volume 10005))
Included in the following conference series:
846Accesses
3Citations
Abstract
Key agreement protocol is generic way to establish a secure private conversation over a public network. Recently, certificateless key agreement (CL-KA) protocol has drawn much attention because it not only efficiently eliminates the problems of key escrow and certificate management but also is more suitable for universal wireless communication environment. However, it is a challenge to design a CL-KA protocol to meet security and efficiency requirement concurrently. In this paper, we propose a new two-party CL-KA protocol with short message under GDH and GBDH assumption. We also present a full security proof for the proposed protocol in extended Canetti-Krawczyk (eCK) security model. The performance shows that the proposed protocol can capture the security requirements and is more efficient than similar CL-KA protocol.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 5719
- Price includes VAT (Japan)
- Softcover Book
- JPY 7149
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sun, H., Wen, Q., Zhang, H., Jin, Z.: A strongly secure identity-based authenticated key agreement protocol without pairings under the gdh assumption. Secur. Commun. Netw.8(17), 3167–3179 (2015)
Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci.281, 182–200 (2014)
Hafizul Islam, S.K., Singh, A.: Provably secure one-round certificateless authenticated group key agreement protocol for secure communications. Wirel. Pers. Commun.85(3), 879–898 (2015)
Zhu, Z., et al.: Cryptanalysis of pairing-free certificateless authenticated key agreement protocol. IACR Cryptology ePrint Archive, p. 253 (2012)
Swanson, C., Jao, D.: A study of two-party certificateless authenticated key-agreement protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 57–71. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10628-6_4
He, D., Chen, J., Jin, H.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst.25(2), 221–230 (2012)
Kim, Y.-J., Kim, Y.-M., Choe, Y.-J.: An efficient bilinear pairing-free certificateless two-party authenticated key agreement protocol in the eCK model. arXiv preprintarXiv:1304.0383 (2013)
Bala, S., Verma, A.K.: A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. Int. J. Ad Hoc Ubiquit. Comput.21(2), 140–155 (2016)
Lin, H.-Y.: Secure certificateless two-party key agreement with short message. Inf. Technol. Contr.45(1), 71–76 (2016)
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1–16. Springer, Heidelberg (2007)
Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-based signature schemes without pairings or random oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008)
Xiong, X., Wong, D.S., Deng, X.: Tinypairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC 2010), pp. 1–6. IEEE (2010)
Author information
Authors and Affiliations
School of Computer Science, Wuhan University, Wuhan, 430072, China
Yong Xie, Libing Wu, Yubo Zhang & Zhiyan Xu
Jingdezhen Ceramic Institute, Jingdezhen, 333403, China
Yong Xie
- Yong Xie
Search author on:PubMed Google Scholar
- Libing Wu
Search author on:PubMed Google Scholar
- Yubo Zhang
Search author on:PubMed Google Scholar
- Zhiyan Xu
Search author on:PubMed Google Scholar
Corresponding author
Correspondence toLibing Wu.
Editor information
Editors and Affiliations
University of Surrey , Guildford, United Kingdom
Liqun Chen
Nanjing University of Finance and Economics, Nanjing, China
Jinguang Han
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Xie, Y., Wu, L., Zhang, Y., Xu, Z. (2016). Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message. In: Chen, L., Han, J. (eds) Provable Security. ProvSec 2016. Lecture Notes in Computer Science(), vol 10005. Springer, Cham. https://doi.org/10.1007/978-3-319-47422-9_14
Download citation
Published:
Publisher Name:Springer, Cham
Print ISBN:978-3-319-47421-2
Online ISBN:978-3-319-47422-9
eBook Packages:Computer ScienceComputer Science (R0)
Share this paper
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative