Skip to main content
Log in

An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Mutual authentication and key agreement are very important security mechanisms in wireless network systems for preventing unauthorized network access, server impersonation attack and malicious attacks of the subsequent session message. Considering the limited computing capability of smart cards or mobile devices, the security scheme design suitable for these mobile devices is a nontrivial challenge. This paper presents an authentication and key agreement mechanism for multi-domain wireless networks using certificateless public key cryptography. Based on the computational Diffie–Hellman assumption and the random oracle model, we show that the proposed scheme is secure against an uncertified user and a malicious registration server simultaneously. As compared with the recently proposed schemes, our scheme enjoys less computational cost on the basis of BLS short signature scheme and has higher security level by exploiting the certificateless public key cryptography system. Moreover, our scheme can be used to mutual authentication and key agreement between members of distinct domains where all the servers use different system parameters. Efficiency analysis of related the security and computation overheads are given to demonstrate that our scheme is well suited for mobile devices with limited computing capability.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in cryptology - CRYPTO’84 (pp. 47–53). Berlin, Germany.

  2. Gentry, C. (1984). Certificate-based encryption and the certificate revocation problem. In Advances in cryptology-EUROCRPYT 2003 (pp. 272–293). Berlin, Germany.

  3. Al-Riyami, S. S., & Paterson, K.G. (2003). Certificateless public key cryptography. In Advances in cryptography-ASIACRYPT 2003 (pp. 452–473). Berlin, Germany.

  4. Choi, K. Y., Park, J. H., Hwang, J. Y., & Lee, D. H. (2007). Efficient certificateless signature schemes. In advances in ACNS 2007 (pp. 443–458). Berlin, Germany.

  5. Zhang, G., & Wang, S. (2008). A certificateless signature and group signature schemes against malicious PKG. In Proceedings of 22nd international conference on advanced information networking and applications (AINA 2008), GinoWan, Okinawa, Japan.

  6. Xu, Z., Liu, X., Zhang, G. Q., & He, W. B. (2008). A certificateless signature scheme for mobilewireless cyber-physical systems. In Proceedings of the 28th international conference on distributed computing systems workshops (ICDCS’08), Beijing, China.

  7. Mandt, T. K., & Tan, C. H. (2006). Certificateless authenticated two-party key agreement protocols. In advances in the 11th Asian computing science conference (pp. 37–44), Tokyo, Japan.

  8. Luo, M., Wen, Y. Y., & Zhao, H. (2008). An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In Proceedings of the 9th international conference for young computer scientists (ICYCS’08), Zhang Jia Jie, Hunan, China.

  9. Lee, E. J., Lee S. E., & Yoo, K. Y. (2008). A certificateless authenticated group key agreement protocol providing forward secrecy. In Proceedings of ubiquitous multimedia computing, 2008 (UMC’08), Wrestpoint Hotel, Hobart, Australia.

  10. Boneh, D., Lynn B., & Shacham, H. (2001). Short signatures from the weil pairing. In Advances in cryptology-Asiacrypt 2001 (pp. 514–532). Berlin, Germany.

  11. Du H. Z., & Wen, Q. Y. (2007). Efficient and provably-secure certificateless short signature scheme from Bilinear Pairings. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2007/250.pdf

  12. Tso, R., Yi, X., & Huang, X. Y. (2008). Efficient and short certificateless signature. In Proceedings of the 7th international conference on cryptology and network security (CANS 2008), Hong-Kong, China.

  13. Das, M. L., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers and Security, 25(3), 184–189.

    Article  Google Scholar 

  14. Goriparthi, T., Das, M. L., Negi, A., & Saxena, A. (2006). Cryptanalysis of recently proposed remote user authentication schemes. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2006/028.pdf

  15. Giri, D., & Srivastava, P. D. (2006). An improved remote user authentication scheme with smart cards using bilinear pairings. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2006/274.pdf

  16. Tseng, Y. M., Wu, T. Y., & Wu, J. D. (2007). A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In Proceedings of the 31st annual international computer software and applications conference (COMPSAC 2007), Beijing, China.

  17. Tseng, Y. M., Wu, T. Y., & Wu, J. D. (2008). A pairing-based user authentication scheme for wireless clients with smart cards. Informatica, 19(2), 285–302.

    Google Scholar 

  18. Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology-CRYPTO 2001 (pp. 213–229). Berlin, Germany.

  19. Boneh, D., & Franklin, M. (2003). Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586–615.

    Article  MATH  MathSciNet  Google Scholar 

  20. Bellare, M., & Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In Proceedings of the 1st annual ACM conference on computer and communications security (ACM CCS’93), Fairfax, Virginia, USA.

  21. Zhang, Z., Wong, D. S., Xu, J., & Feng, D. (2006). Certificateless public-key signature: security model and efficiet construction. In advances in ACNS 2006 (pp. 293–308). Berlin, Germany.

  22. Goldwasser, S., Micali, S., & Rivest, R. L. (1988). A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2), 281–308.

    Article  MATH  MathSciNet  Google Scholar 

  23. Blake-Wilson, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. In advances in the sixth IMA international conference on cryptography and coding (pp. 30–45). Berlin, Germany.

  24. Cheng, Z., Nistazakis, M., Vasiu, L. (2005). On the indistinguishability-based security model of key agreement protocols—simple cases. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2005/129.pdf

  25. Ku, W. C., & Chang, S. T. (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88–B(5), 2165–2167.

    Article  Google Scholar 

  26. Liaw, H. T., Lin, J. F., & Wu, W. C. (2006). An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 44, 223–228.

    Article  MATH  MathSciNet  Google Scholar 

  27. Lauther, K., & Mityagin, A. (2006). Security analysis of KEA authenticated key exchange protocol. In Advances in PKC 2006 (pp. 378–394). Berlin, Germany.

  28. Luo, M., Yan, Q. J., Jiang, G. Q., & Xu, J. F. (2012). An authentication and key agreement mechanism for multi-domain wireless networks using bilinear pairings. In Advances in IWIEE 2012 (pp. 2649–2654). Harbin, China.

Download references

Acknowledgments

We would like to thank the anonymous reviewers for their valuable comments and suggestions. This work is supported by the National Natural Science Foundation of China under contract no. 60803131 and the research project of Jiangxi Province under contract no. GJJ13084, JXJG-13-1-46, 20132BBE50042, 20132BAB211028, 20133BBE50037 and JXYJG-2014-24.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming Luo.

Additional information

This is the extended version of a paper that appeared in IWIEE 2012 [28].

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, M., Zhao, H. An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography. Wireless Pers Commun 81, 779–798 (2015). https://doi.org/10.1007/s11277-014-2157-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-2157-5

Keywords

Navigation