Skip to main content
Log in

A novel pairing-free certificateless authenticated key agreement protocol with provable security

  • Research Article
  • Published:
Frontiers of Computer Science Aims and scope Submit manuscript

Abstract

Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap Diffie-Hellman (GDH) assumption. Furthermore, the proposed protocol is very efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes. Lecture Notes in Computer Science, 1985, 196: 47–53

    Article  MathSciNet  Google Scholar 

  2. Al-Riyami S, Paterson K G. Certificateless public key cryptography. Lecture Notes in Computer Science, 2003, 2894: 452–473

    Article  MathSciNet  Google Scholar 

  3. Wang S, Cao Z, Dong X. Certificateless authenticated key agreement based on the MTI/CO protocol. Journal of Information and Computational Science, 2006, 3(3): 575–581

    Google Scholar 

  4. Shi Y, Li J. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan University Journal of Natural Sciences, 2007, 12(1): 71–74

    Article  MathSciNet  Google Scholar 

  5. Luo M, Wen Y, Zhao H. An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: Proceedings of the 9th International Conference for Young Computer Scientists. 2008, 1577-1582

  6. Mandt T, Tan C. Certificateless authenticated two-party key agreement protocols. Lecture Notes in Computer Science, 2007, 4435: 37–44

    Article  Google Scholar 

  7. Wang F, Zhang Y. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Computer Communications, 2008, 31(10): 2142–2149

    Article  Google Scholar 

  8. Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. Lecture Notes in Computer Science, 2009, 5922: 57–71

    Article  Google Scholar 

  9. Lippold G, Boyd C, Nieto González J. Strongly secure certificateless key agreement. Lecture Notes in Computer Science, 2009, 5671: 206–230

    Article  Google Scholar 

  10. Zhang L, Zhang F, Wu Q, Domingo-Ferrer J. Simulatable certificateless two party authenticated key agreement protocol. Information Sciences, 2010, 180(6): 1020–1030

    Article  MathSciNet  MATH  Google Scholar 

  11. He D, Chen C, Chan S, Bu J. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 2012, 11(1): 48–53

    Article  Google Scholar 

  12. Aranha D, Faz-Hernández A, López J, Rodríguez-Henríquez F. Faster implementation of scalar multiplication on Koblitz curves. In: Proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America. 2012, 177–193

    Google Scholar 

  13. Aranha D, Karabina K, Longa P, Gebotys C, López J. Faster explicit formulas for computing pairings over ordinary curves. Lecture Notes in Computer Science, 2011, 6632: 48–68

    Article  Google Scholar 

  14. Hou M, Xu Q. A two-party certificateless authenticated key agreement protocol without pairing. In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology. 2009, 412–416

    Google Scholar 

  15. He D, Chen Y, Chen J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems, 2012, 25(2): 221–230

    Article  Google Scholar 

  16. He D, Chen Y, Chen J, Zhang R, Han W. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Mathematical and Computer Modelling, 2011, 54(11–12): 3143–3152

    Article  MathSciNet  MATH  Google Scholar 

  17. Xiong H, Wu Q, Chen Z. Toward pairing-free certificateless authenticated key exchanges. Lecture Notes in Computer Science, 2011, 7001: 79–94

    Article  Google Scholar 

  18. Geng M, Zhang F. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security. 2009, 208–212

    Chapter  Google Scholar 

  19. Yang G, Tan C. Strongly secure certificateless key exchange without pairing. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 2011, 71–79

    Google Scholar 

  20. He D, Padhye S, Chen J. An efficient certificateless two-party authenticated key agreement protocol. Computers and Mathematics with Applications, 2012, 64(6): 1914–1926

    Article  MathSciNet  MATH  Google Scholar 

  21. Bellare M, Rogaway P. Entity authentication and key distribution. Lecture Notes in Computer Science, 1993, 773: 232–249

    Article  MathSciNet  Google Scholar 

  22. Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. Lecture Notes in Computer Science, 2001, 2045: 453–474

    Article  MathSciNet  Google Scholar 

  23. LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. In: Proceedings of the 1st International Conference on Provable Security. 2007, 1–16

    Chapter  Google Scholar 

  24. Choo K, Boyd C, Hitchcock Y. Examining indistinguishability-based proof models for key establishment protocols. Lecture Notes in Computer Science, 2005, 3788: 585–604

    Article  MathSciNet  Google Scholar 

  25. Boneh D, Gentry C, Lynn B, Shacham H. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6(2): 1–10

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Haiyan Sun.

Additional information

Haiyan Sun is currently a PhD candidate in State Key Laboratory of Networking and Switch Technology, Beijing University of Posts and Telecommunications. Her present research interests include cryptography, information security, and security in Internet of Things (IoT) and cloud computing.

Qiaoyan Wen received her BS and MS from Shaanxi Normal University in 1981 and 1984, respectively, and her PhD from Xidian University in 1997. Now, she is a professor of Beijing University of Posts and Telecommunications. Her present research interests include cryptography and information security.

Hua Zhang received her BS and MS from Xidian University in 2002 and 2005, respectively, and her PhD from Beijing University of Posts and Telecommunications in 2008. Now she is an associate professor of Beijing University of Posts and Telecommunications. Her research interests include cryptographic protocols, security in IoT, cloud computing, industrial control systems, and mobile Internet.

Zhengping Jin received his BS and MS from Anhui Normal University in 2004 and 2007, respectively, and his PhD from Beijing University of Posts and Telecommunications in 2010. Now he is a lecturer of Beijing University of Posts and Telecommunications. His research interests include design and analysis of cryptographic protocols, and security in IoT.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Sun, H., Wen, Q., Zhang, H. et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front. Comput. Sci. 7, 544–557 (2013). https://doi.org/10.1007/s11704-013-2305-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11704-013-2305-1

Keywords

Navigation