Abstract
Certificateless authenticated key exchange (CL-AKE) protocols do not suffer from intricate certificate management or heavy trust reliance on a third party. Unfortunately, these advantages are partially counteracted in most CL-AKE protocols which require expensive pairing operations. This paper proposes a new CL-AKE protocol without requiring any pairing operation during the protocol execution, although a pairing map may be required to realize a Decisional Diffie-Hellman (DDH) oracle in the security proof. With implicit authentication, we illustrate modular proofs in a security model incorporating standard definitions of AKE protocols and certificateless cryptography. Analysis shows that our protocol is also efficient.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Riyami, S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)
Bao, F., Deng, R., Zhu, H.: Variations of Diffie-Hellman Problem. In: Qing, S., Gollmann, D., Zhou, J. (eds.) ICICS 2003. LNCS, vol. 2836, pp. 301–312. Springer, Heidelberg (2003)
Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: Proc. 1st ACM CCS, pp. 62–73 (1993)
Cao, X., Kou, W., Yu, Y., Sun, Y.: Identity-based authenticated key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E91.A(12), 3833–3836 (2009)
Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences 180(15), 2895–2903 (2010)
Catalano, D., Fiore, D., Gennaro, R.: Certificateless onion routing. In: Proc. 16th ACM CCS, pp. 151–160 (2009)
Chen, L., Cheng, Z., Smart, N.: Identity-based key agreement protocols from pairings. International Journal of Information Security 6(4), 213–241 (2007)
Cilardo, A., Coppolino, L., Mazzocca, N., Romano, L.: Elliptic curve cryptography engineering. Proceedings of the IEEE 94(2), 395–406 (2006)
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Dutta, R., Barua, R.: Overview of Key Agreement Protocols. Cryptology ePrint Archive, Report 2005/289 (2005), http://eprint.iacr.org/
Fiore, D., Gennaro, R.: Making the Diffie-Hellman Protocol Identity-Based. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 165–178. Springer, Heidelberg (2010)
Geng, M., Zhang, F.: Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: IEEE CIS 2009, pp. 208–212 (2009)
Han, W.: Breaking a certificateless key agreement protocol withour bilinear pairing. Cryptology ePrint Archive, Report 11/249 (2011), http://eprint.iacr.org/
He, D., Chen, J., Hu, J.: A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems (2011), doi:10.1002/dac.1265
Hou, M., Xu, Q.: A two-party certificateless authenticated key agreement protocol without pairing. In: 2nd IEEE ICCSIT, pp. 412–416 (2009)
Kaliski Jr., B.S.: An unknown key-share attack on the MQV key agreement protocol. ACM Transactions on Information and System Security 4(3), 275–288 (2001)
Kudla, C., Paterson, K.G.: Modular security proofs for key agreement protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 549–565. Springer, Heidelberg (2005)
Luo, M., Wen, Y., Zhao, H.: An Enhanced Authentication and Key Agreement Mechanism for SIP Using Certificateless Public-key Cryptography. In: 9th ICYCS 2008, pp. 1577–1582 (2008)
Mandt, T.K., Tan, C.H.: Certificateless authenticated two-party key agreement protocols. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 37–44. Springer, Heidelberg (2008)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, USA (1997)
Swanson, C., Jao, D.: A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. In: Roy, B., Sendrier, N. (eds.) INDOCRYPT 2009. LNCS, vol. 5922, pp. 57–71. Springer, Heidelberg (2009)
Wang, F., Zhang, Y.: A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications 31(10), 2142–2149 (2008)
Wang, S., Cao, Z., Wang, L.: Efficient certificateless authenticated key agreement protocol from pairings. Wuhan University Journal of Natural Sciences 11(5), 1278–1282 (2006)
Yang, G., Tan, C.-H.: Strongly secure certificateless key exchange without pairing. In: 6th ACM ASIACCS, pp. 71–79 (2011)
Zhang, L., Zhang, F., Wu, Q., Domingo-Ferrer, J.: Simulatable certificateless two-party authenticated key agreement protocol. Information Sciences 180(6), 1020–1030 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Xiong, H., Wu, Q., Chen, Z. (2011). Toward Pairing-Free Certificateless Authenticated Key Exchanges. In: Lai, X., Zhou, J., Li, H. (eds) Information Security. ISC 2011. Lecture Notes in Computer Science, vol 7001. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24861-0_6
Download citation
DOI: https://doi.org/10.1007/978-3-642-24861-0_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24860-3
Online ISBN: 978-3-642-24861-0
eBook Packages: Computer ScienceComputer Science (R0)