Abstract
Due to the high computation cost of bilinear pairings, pairing-free cryptosystems have received widespread attention recently. Various pairing-free two-party key agreement protocols in the context of public key cryptography (PKC) have been studied. To avoid complex certificate management in traditional PKC and key escrow problem in identity-based ones, several certificateless cryptosystems have been proposed in this research area. In this paper, we proposed a secure and efficient certificateless pairing-free two-party key agreement protocol. In comparison with related works, our protocol requires less computational cost.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adams, C., Lloyd, S.: Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations, 2nd edn. Pearson education, Boston (2003)
Shamir, A.: Identity-based cryptosystems and signature schemes. Advances in Cryptology—Crypto. Lecture Notes In Computer Science. Springer, Berlin (1984)
Boneh, D., Franklin, M.: Identity based encryption from the weil pairing. Advances in Cryptology—Crypto. Springer, Berlin (2001)
Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: Laih, C.S. (ed.) Advances in Cryptology C Asiacrypt 2003. Lecture Notes in Computer Science, pp. 452–473. Springer, Berlin (2003)
Wang, S., Cao, Z., Dong, X.: Certificateless authenticated key agreement based on the MTI/CO protocol. J. Inf. Comput. Sci 3, 575–581 (2006)
Mandt, T., Tan, C.: Certificateless authenticated two-party key agreement protocols. In: Proceedings of the ASIAN 2006. LNCS, vol. 4435, pp. 37–44. Springer, Berlin (2006)
Shi, Y., Li, J.: Two-party authenticated key agreement in certificateless public key cryptography. Wuhan Univ. J. Nat. Sci. 12(1), 71–74 (2007)
Lippold, G., Boyd, C., Nieto, J.: Strongly secure certificateless key agreement. Pairing 2009, pp. 206–230. Springer, Berlin (2009)
Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6, 213–241 (2007)
Hou, M., Xu, Q.: A two-party certificateless authenticated key agreement protocol without pairing. In: 2nd IEEE international conference on computer science and information technology, pp. 412–416, 2009
Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Proceedings of the 8th international conference on information security. Volume 3650 of LNCS, pp. 134–148. Springer, Berlin doi: 10.1007/11556992, 2005
Geng, M., Zhang, F.: Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: International conference on computational intelligence and security, pp. 208–212, 2009
Yang, G., Tan, C. Strongly secure certificateless key exchange without pairing. In: 6th ACM symposium on information, computer and communications security, pp. 71–79, 2011
He, D., Chen, J., Hu, J.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst. 25, 221–230 (2011). doi:10.1002/dac.1265
He, D., Chen, Y., Chen, J., Zhang, R., Han, W.: A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math. Comput. Model. 54(11–12), 3143–3152 (2011)
He, D., Padhye, S., Chen, J.: An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl. 64(6), 1914–1926 (2012)
Sun, H., Wen, Q., Zhang, H., Jin, Z.: A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front. Comput. Sci. 7, 544–557 (2013)
Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On the indistinguishability-based security model of key agreement protocols-simple cases. Cryptology ePrint Arch. 2005, 129 (2005)
Blake-Wilson, S., Johnson, D., Menezes, A. Key agreement protocols and their security analysis. In: Proceedings of the 6th IMA international conference on cryptography and coding, LNCS, Springer, vol. 1335, pp. 30–45 (1997)
Acknowledgments
Authors would like to thank Universiti Teknologi Malaysia and Ministry of Higher Education, Malaysia, for sponsoring this research under vote number 01G98.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Ghoreishi, SM., Isnin, I.F., Razak, S.A., Chizari, H. (2015). An Efficient Pairing-Free Certificateless Authenticated Two-Party Key Agreement Protocol Over Elliptic Curves. In: Abraham, A., Muda, A., Choo, YH. (eds) Pattern Analysis, Intelligent Security and the Internet of Things. Advances in Intelligent Systems and Computing, vol 355. Springer, Cham. https://doi.org/10.1007/978-3-319-17398-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-17398-6_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-17397-9
Online ISBN: 978-3-319-17398-6
eBook Packages: EngineeringEngineering (R0)