Skip to main content

2018 | OriginalPaper | Buchkapitel

A Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol

verfasst von : Shan Chun, Hu Kangwen, Xue Jingfeng, Hu Changzhen, Ma Rui

Erschienen in: Lecture Notes in Real-Time Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Pairing-free certificate-less two-party authenticated key agreement (CT-AKA) protocol is computation-efficient, easily manageable, and less key escrow dependent compared to traditional pairing-based identity-based protocol. In this paper, we propose four types of attacks on CT-AKA, present a pairing-free CT-AKA protocol and analyze its security in Lippold model. Compared with relevant CT-AKA protocols, our protocol is more efficient, secure and practical to apply.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Sattam, S., Al-Riyami, Paterson, K.G.: Certificate-less public key cryptography. In: ASIACRYPT, vol. 2894. Lecture Notes in Computer Science, LNCS, pp. 452–473 (2003) Sattam, S., Al-Riyami, Paterson, K.G.: Certificate-less public key cryptography. In: ASIACRYPT, vol. 2894. Lecture Notes in Computer Science, LNCS, pp. 452–473 (2003)
2.
Zurück zum Zitat Shamir, A.: Identity based cryptosystems and signature schemes. In: Proceedings of the CRYPTO 1984, LNCS, vol. 196, pp. 47–53. Springer (1984) Shamir, A.: Identity based cryptosystems and signature schemes. In: Proceedings of the CRYPTO 1984, LNCS, vol. 196, pp. 47–53. Springer (1984)
3.
Zurück zum Zitat Haiyan, S., Qiaoyan, W., Hua, Z., Zhengping, J.: A strongly secure pairing-free certificate-less authenticated key agreement protocol for low-power devices. Inf. Technol. Control 42(2), 113–123 (2013) Haiyan, S., Qiaoyan, W., Hua, Z., Zhengping, J.: A strongly secure pairing-free certificate-less authenticated key agreement protocol for low-power devices. Inf. Technol. Control 42(2), 113–123 (2013)
4.
Zurück zum Zitat Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificate-less key agreement. In: Pairing 2009, Volume 5671 of Lecture Notes in Computer Science, LNCS vol. 5671, pp. 206–230 (2009) Lippold, G., Boyd, C., Nieto, J.G.: Strongly secure certificate-less key agreement. In: Pairing 2009, Volume 5671 of Lecture Notes in Computer Science, LNCS vol. 5671, pp. 206–230 (2009)
5.
Zurück zum Zitat Swanson, C.M.: Security in key agreement: two-party certificate-less schemes. Master’s thesis, University of Waterloo, Department of Combinatorics and Optimization (2008) Swanson, C.M.: Security in key agreement: two-party certificate-less schemes. Master’s thesis, University of Waterloo, Department of Combinatorics and Optimization (2008)
6.
Zurück zum Zitat Hou, H.: An authenticated certificate-less key agreement protocol without bilinear pairing. In: International Conference on Computer Science and Service System (CSSS), pp. 2986–2989 (2011) Hou, H.: An authenticated certificate-less key agreement protocol without bilinear pairing. In: International Conference on Computer Science and Service System (CSSS), pp. 2986–2989 (2011)
7.
Zurück zum Zitat Geng, M., Zhang, F.: Provably secure certificate-less two-party authenticated key agreement protocol without pairing. In: 2009 International Conference on Computational Intelligence and Security, pp. 208–212 (2009) Geng, M., Zhang, F.: Provably secure certificate-less two-party authenticated key agreement protocol without pairing. In: 2009 International Conference on Computational Intelligence and Security, pp. 208–212 (2009)
8.
Zurück zum Zitat He, D., Chen, Y., Chen, J., et al.: A new two-round certificate-less authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54, 3143–3152 (2011)CrossRefMATH He, D., Chen, Y., Chen, J., et al.: A new two-round certificate-less authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54, 3143–3152 (2011)CrossRefMATH
9.
Zurück zum Zitat Hou, M., Xu, Q.: Key replicating attack on certificate-less authenticated key agreement protocol. In: Proceedings of the IEEE COMPUTER SOC’2009, pp. 574–577 (2009) Hou, M., Xu, Q.: Key replicating attack on certificate-less authenticated key agreement protocol. In: Proceedings of the IEEE COMPUTER SOC’2009, pp. 574–577 (2009)
10.
Zurück zum Zitat Blake, I., Seroussi, G., Smart, N.: Advances in elliptic curve cryptography. In: Galbraith, S. (ed.) Pairings. Cambridge University Press (2005) Blake, I., Seroussi, G., Smart, N.: Advances in elliptic curve cryptography. In: Galbraith, S. (ed.) Pairings. Cambridge University Press (2005)
11.
Zurück zum Zitat Farouk, A., Miri, A., et al.: Efficient pairing-free, certificate-less two-party authenticated key agreement protocol for grid computing. In: 2014 Fourth International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), pp. 279–284 Farouk, A., Miri, A., et al.: Efficient pairing-free, certificate-less two-party authenticated key agreement protocol for grid computing. In: 2014 Fourth International Conference on Digital Information and Communication Technology and it’s Applications (DICTAP), pp. 279–284
12.
Zurück zum Zitat Yang, L.: Certificate-less implicit authentication and key agreement protocol without pairing operation. Comput. Eng. 38(2), 138–140 (2012) Yang, L.: Certificate-less implicit authentication and key agreement protocol without pairing operation. Comput. Eng. 38(2), 138–140 (2012)
13.
Zurück zum Zitat Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)CrossRef Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)CrossRef
14.
Zurück zum Zitat Liu, W., Chunxiang, X.: Certificate-less two-party key agreement scheme without bilinear pairing. Appl. Res. Comput. 27(11), 4287–4292 (2010) Liu, W., Chunxiang, X.: Certificate-less two-party key agreement scheme without bilinear pairing. Appl. Res. Comput. 27(11), 4287–4292 (2010)
15.
Zurück zum Zitat Hui, Z.H.U., Hui, L.I., Shichong, T.A.N., Yumin, W.A.N.G.: Certificate-less authentication protocol without pairing. Geomat. Inf. Sci. Wuhan Univ. 35(5), 574–577 (2010)CrossRef Hui, Z.H.U., Hui, L.I., Shichong, T.A.N., Yumin, W.A.N.G.: Certificate-less authentication protocol without pairing. Geomat. Inf. Sci. Wuhan Univ. 35(5), 574–577 (2010)CrossRef
16.
Zurück zum Zitat Tu, H., Kumar, N., Kim, J., Seo, J.: A strongly secure pairing-free certificate-less authenticated key agreement protocol suitable for smart media and mobile environments. Multimed Tools Appl. (2015) Tu, H., Kumar, N., Kim, J., Seo, J.: A strongly secure pairing-free certificate-less authenticated key agreement protocol suitable for smart media and mobile environments. Multimed Tools Appl. (2015)
17.
Zurück zum Zitat Haiyan, S., Qiaoyan, W., Hua, Z., et al.: A strongly secure pairing-free certificate-less authenticated key agreement protocol for low-power devices. Inf. Technol. Control 42(2), 191–204 (2013) Haiyan, S., Qiaoyan, W., Hua, Z., et al.: A strongly secure pairing-free certificate-less authenticated key agreement protocol for low-power devices. Inf. Technol. Control 42(2), 191–204 (2013)
18.
Zurück zum Zitat Sun, H., Wen, Q., Zhang, H., et al.: A novel pairing-free certificate-less authenticated key agreement protocol with provable security. Front. Comput. Sci. 7(4), 544–557 (2013)MathSciNetCrossRef Sun, H., Wen, Q., Zhang, H., et al.: A novel pairing-free certificate-less authenticated key agreement protocol with provable security. Front. Comput. Sci. 7(4), 544–557 (2013)MathSciNetCrossRef
19.
Zurück zum Zitat Choo, K-K.R.: Secure Key Establishment. Springer (2008) Choo, K-K.R.: Secure Key Establishment. Springer (2008)
20.
Zurück zum Zitat Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer (2003) Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Springer (2003)
21.
Zurück zum Zitat Hou, M., Xu, Q.: A two-party certificate-less authenticated key agreement protocol without pairing. In: Proceedings of the 4th International Conference on Computer Science and Information Technology, pp. 412–416. [S. I.]: IEEE Computer Society (2009) Hou, M., Xu, Q.: A two-party certificate-less authenticated key agreement protocol without pairing. In: Proceedings of the 4th International Conference on Computer Science and Information Technology, pp. 412–416. [S. I.]: IEEE Computer Society (2009)
22.
Zurück zum Zitat Tong, D., Liu, J.W., et al.: Certificate-less and pairing-free key agreement scheme for satellite network. In: Communications Security Conference (CSC 2014), pp. 1–5 (2014) Tong, D., Liu, J.W., et al.: Certificate-less and pairing-free key agreement scheme for satellite network. In: Communications Security Conference (CSC 2014), pp. 1–5 (2014)
23.
Zurück zum Zitat Lamcchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Proceedings of the 1st International Conference on Provable Security (ProvSec’2007), LNCS 4784, pp. 1–16. Springer (2007) Lamcchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Proceedings of the 1st International Conference on Provable Security (ProvSec’2007), LNCS 4784, pp. 1–16. Springer (2007)
24.
Zurück zum Zitat Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Proceedings of the CRYPTO 2002, pp. 354–368. London, UK: Springer (2002) Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystems. In: Proceedings of the CRYPTO 2002, pp. 354–368. London, UK: Springer (2002)
25.
Zurück zum Zitat Boneh, D., Shacham, H., Lynn, B.: Short signatures from the Weil pairing. In: Advances in Cryptology—AISACRYPT 2001, pp. 514–532. Springer (2001) Boneh, D., Shacham, H., Lynn, B.: Short signatures from the Weil pairing. In: Advances in Cryptology—AISACRYPT 2001, pp. 514–532. Springer (2001)
26.
Zurück zum Zitat Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of the EUROCRYPT 2001. LNCS, pp. 245, 453–474. Springer (2001) Canetti, R., Krawczyk, H.: Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of the EUROCRYPT 2001. LNCS, pp. 245, 453–474. Springer (2001)
27.
Zurück zum Zitat Okamoto, T., Pointcheval, D.: The gap problems: a new class of problems for the security of cryptographic primitives. In: PKC 2001, vol. 30, pp. 104–118. Springer (2001) Okamoto, T., Pointcheval, D.: The gap problems: a new class of problems for the security of cryptographic primitives. In: PKC 2001, vol. 30, pp. 104–118. Springer (2001)
28.
Zurück zum Zitat Padugupati, P., Reddy, K.R.: Secure and cost effective cryptosystem design based on random multiple key streams. J. Inf. Secur. Res. 7(1), 29–40 (2016) Padugupati, P., Reddy, K.R.: Secure and cost effective cryptosystem design based on random multiple key streams. J. Inf. Secur. Res. 7(1), 29–40 (2016)
Metadaten
Titel
A Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol
verfasst von
Shan Chun
Hu Kangwen
Xue Jingfeng
Hu Changzhen
Ma Rui
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-60744-3_23