Abstract
Key agreement protocol is generic way to establish a secure private conversation over a public network. Recently, certificateless key agreement (CL-KA) protocol has drawn much attention because it not only efficiently eliminates the problems of key escrow and certificate management but also is more suitable for universal wireless communication environment. However, it is a challenge to design a CL-KA protocol to meet security and efficiency requirement concurrently. In this paper, we propose a new two-party CL-KA protocol with short message under GDH and GBDH assumption. We also present a full security proof for the proposed protocol in extended Canetti-Krawczyk (eCK) security model. The performance shows that the proposed protocol can capture the security requirements and is more efficient than similar CL-KA protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Sun, H., Wen, Q., Zhang, H., Jin, Z.: A strongly secure identity-based authenticated key agreement protocol without pairings under the gdh assumption. Secur. Commun. Netw. 8(17), 3167–3179 (2015)
Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)
Hafizul Islam, S.K., Singh, A.: Provably secure one-round certificateless authenticated group key agreement protocol for secure communications. Wirel. Pers. Commun. 85(3), 879–898 (2015)
Zhu, Z., et al.: Cryptanalysis of pairing-free certificateless authenticated key agreement protocol. IACR Cryptology ePrint Archive, p. 253 (2012)
Swanson, C., Jao, D.: A study of two-party certificateless authenticated key-agreement protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 57–71. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10628-6_4
He, D., Chen, J., Jin, H.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2), 221–230 (2012)
Kim, Y.-J., Kim, Y.-M., Choe, Y.-J.: An efficient bilinear pairing-free certificateless two-party authenticated key agreement protocol in the eCK model. arXiv preprint arXiv:1304.0383 (2013)
Bala, S., Verma, A.K.: A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. Int. J. Ad Hoc Ubiquit. Comput. 21(2), 140–155 (2016)
Lin, H.-Y.: Secure certificateless two-party key agreement with short message. Inf. Technol. Contr. 45(1), 71–76 (2016)
LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1–16. Springer, Heidelberg (2007)
Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-based signature schemes without pairings or random oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008)
Xiong, X., Wong, D.S., Deng, X.: Tinypairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC 2010), pp. 1–6. IEEE (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Xie, Y., Wu, L., Zhang, Y., Xu, Z. (2016). Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message. In: Chen, L., Han, J. (eds) Provable Security. ProvSec 2016. Lecture Notes in Computer Science(), vol 10005. Springer, Cham. https://doi.org/10.1007/978-3-319-47422-9_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-47422-9_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47421-2
Online ISBN: 978-3-319-47422-9
eBook Packages: Computer ScienceComputer Science (R0)