Skip to main content

An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves

  • Conference paper
  • First Online:
Pattern Analysis, Intelligent Security and the Internet of Things

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 355))

  • 1490 Accesses

Abstract

Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received widespread attention recently. Various pairing-free two-party key agreement protocols in the context of public key cryptography (PKC) have been studied. To avoid complex certificate management in traditional PKC and key escrow problem in identity-based ones, several certificateless cryptosystems have been proposed in this research area. In this paper, we proposed a secure and efficient certificateless pairing-free two-party key agreement protocol. In comparison with related works, our protocol requires less computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Adams, C., Lloyd, S.: Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations, 2nd edn. Pearson education, Boston (2003)

    Google Scholar 

  2. Shamir, A.: Identity-based cryptosystems and signature schemes. Advances in Cryptology—Crypto. Lecture Notes In Computer Science. Springer, Berlin (1984)

    Google Scholar 

  3. Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. Advances in Cryptology—Crypto. Springer, Berlin (2001)

    Google Scholar 

  4. Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.) Advances in Cryptology C Asiacrypt 2003. Lecture Notes in Computer Science, pp. 452–473. Springer, Berlin (2003)

    Chapter  Google Scholar 

  5. Wang, S., Cao, Z., Dong, X.: Certificateless authenticated key agreement based on the MTI/CO protocol. J. Inf. Comput. Sci 3, 575–581 (2006)

    Google Scholar 

  6. Mandt, T., Tan, C.: Certificateless authenticated two-party key agreement protocols. In: Proceedings of the ASIAN 2006. LNCS, vol. 4435, pp. 37–44. Springer, Berlin (2006)

    Google Scholar 

  7. Shi, Y., Li, J.: Two-party authenticated key agreement in certificateless public key cryptography. Wuhan Univ. J. Nat. Sci. 12(1), 71–74 (2007)

    Article  MathSciNet  Google Scholar 

  8. Lippold, G., Boyd, C., Nieto, J.: Strongly secure certificateless key agreement. Pairing 2009, pp. 206–230. Springer, Berlin (2009)

    Google Scholar 

  9. Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)

    Article  Google Scholar 

  10. Hou, M., Xu, Q.: A two-party certificateless authenticated key agreement protocol without pairing. In: 2nd IEEE international conference on computer science and information technology, pp. 412–416, 2009

    Google Scholar 

  11. Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Proceedings of the 8th international conference on information security. Volume 3650 of LNCS, pp. 134–148. Springer, Berlin doi: 10.1007/11556992, 2005

  12. Geng, M., Zhang, F.: Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: International conference on computational intelligence and security, pp. 208–212, 2009

    Google Scholar 

  13. Yang, G., Tan, C. Strongly secure certificateless key exchange without pairing. In: 6th ACM symposium on information, computer and communications security, pp. 71–79, 2011

    Google Scholar 

  14. He, D., Chen, J., Hu, J.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25, 221–230 (2011). doi:10.1002/dac.1265

    Article  Google Scholar 

  15. He, D., Chen, Y., Chen, J., Zhang, R., Han, W.: A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11–12), 3143–3152 (2011)

    Article  MATH  MathSciNet  Google Scholar 

  16. He, D., Padhye, S., Chen, J.: An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  17. Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front. Comput. Sci. 7, 544–557 (2013)

    Article  MathSciNet  Google Scholar 

  18. Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Arch. 2005, 129 (2005)

    Google Scholar 

  19. Blake-Wilson, S., Johnson, D., Menezes, A. Key agreement protocols and their security analysis. In: Proceedings of the 6th IMA international conference on cryptography and coding, LNCS, Springer, vol. 1335, pp. 30–45 (1997)

    Google Scholar 

Download references

Acknowledgments

Authors would like to thank Universiti Teknologi Malaysia and Ministry of Higher Education, Malaysia, for sponsoring this research under vote number 01G98.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seyed-Mohsen Ghoreishi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Ghoreishi, SM., Isnin, I.F., Razak, S.A., Chizari, H. (2015). An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves. In: Abraham, A., Muda, A., Choo, YH. (eds) Pattern Analysis, Intelligent Security and the Internet of Things. Advances in Intelligent Systems and Computing, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-17398-6_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17398-6_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17397-9

  • Online ISBN: 978-3-319-17398-6

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics