Abstract
To ensure secure communication between any two entities, authenticated key agreement protocol is the primary step and current research has a lot of contribution in this direction. In this paper, we propose a Pairing Free Identity-based Two-Party Authenticated Key Agreement protocol and gather the implementation results for Wireless Sensor Networks on MICAz mote by using Relic-toolkit cryptographic library. The proposed protocol is efficient as it does not use any pairing operation and only uses three scalar point multiplications. The security of the protocol has been proved secure using strongest security model for identity-based key agreement protocol presented by Liang et al.


Similar content being viewed by others
References
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
Smart, N. (2002). Identity-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 38(13), 630–632.
Boneh, D., & Franklin, M. (2001) Identity-based encryption from the weil pairing. In Advances in cryptology CRYPTO 2001, volume 2139 of lecture notes in computer science (pp. 213–229). Berlin: Springer. doi:10.1007/3-540-44647-8_13.
Chen, L., & Kudla, C. (2003). Identity based authenticated key agreement protocols from pairings. In Proceedings of the 16th IEEE computer security foundations workshop, 2003, pp. 219–233.
Shim, K. (2003). Efficient ID-based authenticated key agreement protocol based on weil pairing. Electronics Letters, 39(8), 653–654.
Xun, Y. (2003). Efficient ID-based key agreement from weil pairing. Electronics Letters, 39(2), 206–208.
Sun, H., & Hsieh, B. (2003). Security analysis of shim’s authenticated key agreement protocols from pairings. Cryptology ePrint Archive, Report 2003/113. http://eprint.iacr.org/.
Boyd, C., & Choo, K. (2005). Security of two-party identity-based key agreement. In Progress in cryptology mycrypt 2005, volume 3715 of lecture notes in computer science (pp. 229–243). Berlin: Springer. doi:10.1007/11554868_17.
Ryu, E., Yoon, E., & Yoo, K. An efficient id-based authenticated key agreement protocol from pairings. In Networking 2004, volume 3042 of lecture notes in computer science (pp. 1458–1463). Berlin: Springer. doi:10.1007/978-3-540-24693-0_135.
Wang S., Cao Z., Choo K., & Wang L. (2009). An improved identity-based key agreement protocol and its security proof. Information Sciences, 179(3):307–318. http://www.sciencedirect.com/science/article/pii/S002002550800399X.
McCullagh, N., & Barreto, P. (2005). A new two-party identity-based authenticated key agreement. In Topics in cryptology CT-RSA 2005, volume 3376 of lecture notes in computer science (pp. 262–274). Berlin: Springer. doi:10.1007/978-3-540-30574-3_18.
Xie, G. (2004). Cryptanalysis of noel mccullagh and paulo s. l. m. barretos two-party identity-based key agreement. Cryptology ePrint Archive, Report 2004/308. http://eprint.iacr.org/.
Li, S., Yuan, Q., & Li, J. (2005). Towards security two-part authenticated key agreement protocols. IACR Eprint archive. http://eprint.iacr.org/2005/300.
Zhu, R., Yang, G., & Wong, D. (2007). An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theoretical Computer Science, 378(2):198–207. http://www.sciencedirect.com/science/article/pii/S0304397507001120.
Cao, X., Kou, W., Yu, Y., & Sun, R. (2008). Identity-based authentication key agreement protocols without bilinear pairings. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E91A(12):38333836. https://www.jstage.jst.go.jp/article/transfun/E91.A/12/E91.A_12_3833/_article.
Cao, X., Kou, W., & Du, X. (2010). A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Information Sciences, 180(15):2895–2903. http://www.sciencedirect.com/science/article/pii/S0020025510001519.
Kudla, C., & Paterson, K. (2005). Modular security proofs for key agreement protocols. Advances in cryptology—ASIACRYPT 2005, volume 3788 of lecture notes in computer science (pp. 549–565) Berlin: Springer.
Hafizul, S., & Biswas, G. (2012). An improved pairing-free identity-based authenticated key agreement protocol based on ECC. Procedia Engineering, 30, 499–507. International conference on communication technology and system design 2011.
Blake, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. Crytography and Coding, volume 1355 of Lecture Notes in Computer Science (pp. 30–45). Berlin: Springer.
Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., et al. (2005). Tinyos: An operating system for sensor networks. In Ambient intelligence (pp. 115–148). Berlin: Springer. doi:10.1007/3-540-27139-2_7.
Aranha, D., & Gouvêa, C. RELIC is an efficient library for cryptography. http://code.google.com/p/relic-toolkit/.
Rev. A. Mpr-mib series user manual. http://www-db.ics.uci.edu/pages/research/quasar/MPR-MIB%20Series%20User%20Manual%207430-0021-06_A.pdf, 2004.
Liang, N., Gongliang, C., & Jianhua, L. (2013). Escrowable identity-based authenticated key agreement protocol with strong security. Computers & Mathematics with Applications, 65(9), 1339–1349. Advanced Information Security.
LaMacchia, B., Lauter, K., & Mityagin, A. (2007). Stronger security of authenticated key exchange. In Provable security, volume 4784 of lecture notes in computer science (pp. 1–16). Berlin: Springer. doi:10.1007/978-3-540-75670-5_1.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Bala, S., Sharma, G. & Verma, A.K. PF-ID-2PAKA: Pairing Free Identity-Based Two-Party Authenticated Key Agreement Protocol for Wireless Sensor Networks. Wireless Pers Commun 87, 995–1012 (2016). https://doi.org/10.1007/s11277-015-2626-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-015-2626-5