Skip to main content

Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10005))

Abstract

Key agreement protocol is generic way to establish a secure private conversation over a public network. Recently, certificateless key agreement (CL-KA) protocol has drawn much attention because it not only efficiently eliminates the problems of key escrow and certificate management but also is more suitable for universal wireless communication environment. However, it is a challenge to design a CL-KA protocol to meet security and efficiency requirement concurrently. In this paper, we propose a new two-party CL-KA protocol with short message under GDH and GBDH assumption. We also present a full security proof for the proposed protocol in extended Canetti-Krawczyk (eCK) security model. The performance shows that the proposed protocol can capture the security requirements and is more efficient than similar CL-KA protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sun, H., Wen, Q., Zhang, H., Jin, Z.: A strongly secure identity-based authenticated key agreement protocol without pairings under the gdh assumption. Secur. Commun. Netw. 8(17), 3167–3179 (2015)

    Article  Google Scholar 

  2. Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)

    Article  MathSciNet  Google Scholar 

  3. Hafizul Islam, S.K., Singh, A.: Provably secure one-round certificateless authenticated group key agreement protocol for secure communications. Wirel. Pers. Commun. 85(3), 879–898 (2015)

    Article  Google Scholar 

  4. Zhu, Z., et al.: Cryptanalysis of pairing-free certificateless authenticated key agreement protocol. IACR Cryptology ePrint Archive, p. 253 (2012)

    Google Scholar 

  5. Swanson, C., Jao, D.: A study of two-party certificateless authenticated key-agreement protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 57–71. Springer, Heidelberg (2009). doi:10.1007/978-3-642-10628-6_4

    Chapter  Google Scholar 

  6. He, D., Chen, J., Jin, H.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25(2), 221–230 (2012)

    Article  Google Scholar 

  7. Kim, Y.-J., Kim, Y.-M., Choe, Y.-J.: An efficient bilinear pairing-free certificateless two-party authenticated key agreement protocol in the eCK model. arXiv preprint arXiv:1304.0383 (2013)

  8. Bala, S., Verma, A.K.: A non-interactive certificateless two-party authenticated key agreement protocol for wireless sensor networks. Int. J. Ad Hoc Ubiquit. Comput. 21(2), 140–155 (2016)

    Article  Google Scholar 

  9. Lin, H.-Y.: Secure certificateless two-party key agreement with short message. Inf. Technol. Contr. 45(1), 71–76 (2016)

    Google Scholar 

  10. LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1–16. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  11. Liu, J.K., Baek, J., Susilo, W., Zhou, J.: Certificate-based signature schemes without pairings or random oracles. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 285–297. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Xiong, X., Wong, D.S., Deng, X.: Tinypairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: Wireless Communications and Networking Conference (WCNC 2010), pp. 1–6. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Libing Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Xie, Y., Wu, L., Zhang, Y., Xu, Z. (2016). Strongly Secure Two-Party Certificateless Key Agreement Protocol with Short Message. In: Chen, L., Han, J. (eds) Provable Security. ProvSec 2016. Lecture Notes in Computer Science(), vol 10005. Springer, Cham. https://doi.org/10.1007/978-3-319-47422-9_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47422-9_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47421-2

  • Online ISBN: 978-3-319-47422-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics