Hierarchical certificateless authenticated key agreement protocol

被引:0
|
作者
Su H. [1 ]
Liu J.-W. [1 ]
Tao R. [1 ]
机构
[1] School of Electronic and Information Engineering, Beihang University, Beijing
来源
基金
中国国家自然科学基金;
关键词
Certificateless; Computational Diffie-Hellman assumption; eCK model; Hierarchical authenticated key agreement protocol;
D O I
10.11959/j.issn.1000-436x.2016145
中图分类号
学科分类号
摘要
A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computational Diffie-Hellman assumption. In the protocol, a root PKG authenticates the identity and generates a partial private key for lower-level PKG which authenticate the identity and generate a partial private key for users, private key generated by partial private key and user selected secret value. Comparing with the existing protocols, the protocol is efficient without bilinear pairings computation. © 2016, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:161 / 171
页数:10
相关论文
共 17 条
  • [1] Hunt R., PKI and digital certification infrastructure, Ninth IEEE International Conference on Networks. IEEE, pp. 234-239, (2001)
  • [2] Shamir A., Identity based cryptosystems and signature schemes, Advances in Cryptology Crypto84, pp. 47-53, (1984)
  • [3] Al-Riyami S.S., Paterson K.G., Certificateless public key cryptography, Advances in Cryptology-ASIACRYPT 2003, pp. 452-473, (2003)
  • [4] He D., Chen Y., Chen J., Et al., A new two-round certificateless authenticated key agreement protocol without bilinear pairings, Mathematical and Computer Modelling, 54, 11, pp. 3143-3152, (2011)
  • [5] He D., Chen J., Hu J., A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems, 25, 2, pp. 221-230, (2012)
  • [6] He D., Padhye S., Chen J., An efficient certificateless two-party authenticated key agreement protocol, Computers & Mathematics with Applications, 64, 6, pp. 1914-1926, (2012)
  • [7] Tong D., Liu J.W., Mao K.F., Et al., Certificateless and pairing-free key agreement scheme for satellite network, Communications Security Conference (CSC 2014). IET, pp. 1-5, (2014)
  • [8] Mohamed N.A.F., Hashim M.H.A., Bashier E., Et al., Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol, 2012 World Congress on Internet Security (WorldCIS), IEEE, pp. 167-172, (2012)
  • [9] Sun H.Y., Wen Q.Y., Zhang H., Et al., A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices, Information Technology and Control, 42, 2, pp. 191-204, (2013)
  • [10] Ghoreishi S.M., Abd R.S., Isnin I.F., Et al., New secure identity-based and certificateless authenticated key agreement protocols without pairings, 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 188-192, (2014)