A privacy-preserving certificateless two-party authenticated key exchange protocol without bilinear pairing for mobile-commerce applications

被引:1
|
作者
Ogundoyin, Sunday Oyinlola [1 ]
机构
[1] Department of Electrical and Electronic Engineering, University of Ibadan, Ibadan, Nigeria
来源
关键词
Public key cryptography - Geometry;
D O I
10.1080/23742917.2019.1595357
中图分类号
学科分类号
摘要
In recent times, several three-party authenticated key exchange (3PAKE) and two-party authenticated key exchange (2PAKE) protocols have been proposed to establish secret session key for confidentiality of transactions among clients in mobile commerce (m-commerce) environments. However, the involvement of a trusted server (TS) in every communication as well as the numerous communication rounds and many message exchanges in 3PAKE make them unsuitable for m-commerce applications. In this work, we propose an efficient and privacy-preserving 2PAKE protocol based on certificateless public key cryptography using elliptic curve cryptography with only one communication round and one message exchange between two clients. The protocol is provably secure, autonomous and provides conditional, location and identity privacies. The performance analysis shows that the proposed protocol has better efficiency than the existing related protocols in terms of computation cost and communication overheads. © 2019, © 2019 Informa UK Limited, trading as Taylor & Francis Group.
引用
收藏
页码:137 / 162
相关论文
共 50 条
  • [1] A Two-Party Certificateless Authenticated Key Agreement Protocol without Pairing
    Hou, Mengbo
    Xu, Qiuliang
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 412 - 416
  • [2] Simulatable certificateless two-party authenticated key agreement protocol
    Zhang, Lei
    Zhang, Futai
    Wu, Qianhong
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2010, 180 (06) : 1020 - 1030
  • [3] An efficient certificateless two-party authenticated key agreement protocol
    He, Debiao
    Padhye, Sahadeo
    Chen, Jianhua
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 64 (06) : 1914 - 1926
  • [4] Certificateless-based two-party authenticated key agreement protocol
    Hou, Meng-Bo
    Xu, Qiu-Liang
    Guo, Shan-Qing
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (SUPPL. 1): : 321 - 329
  • [5] Two-party certificateless authenticated key agreement protocol with enhanced security
    Tao W.
    Xiaojun J.
    Journal of China Universities of Posts and Telecommunications, 2019, 26 (01): : 12 - 20
  • [6] Two-party certificateless authenticated key agreement protocol with enhanced security
    Wu Tao
    Jing Xiaojun
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2019, 26 (01) : 12 - 20
  • [7] Secure and Efficient Two-Party Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL III, 2009, : 308 - 311
  • [8] Efficient Pairing-Free, Certificateless Two-Party Authenticated Key Agreement Protocol for Grid Computing
    Farouk, Amr
    Miri, Ali
    Fouad, Mohamed M.
    Abdelhafez, Ahmed A.
    2014 FOURTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION AND COMMUNICATION TECHNOLOGY AND IT'S APPLICATIONS (DICTAP), 2014, : 279 - 284
  • [9] Certificateless One-Way Authenticated Two-Party Key Agreement Protocol
    Chen, Wuping
    Zhang, Lei
    Qin, Bo
    Wu, Qianhong
    Zhang, Huanguo
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 483 - +
  • [10] An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves
    Ghoreishi, Seyed-Mohsen
    Isnin, Ismail Fauzi
    Abd Razak, Shukor
    Chizari, Hassan
    PATTERN ANALYSIS, INTELLIGENT SECURITY AND THE INTERNET OF THINGS, 2015, 355 : 295 - 302