Avoiding Key Off-Set attack in a Pairing-Free Certificateless Key Agreement Protocol based on ECC

key establishment protocol allows entities to establish a common secret key to ensure secure communications over an insecure public network. This paper proposes two new two- party key agreement protocols. Both protocols do not involve bilinear pairings. The first protocol is a certificate-based key agreement protocol that is more efficient than (1) due to its dependence on the elliptic curve discrete logarithm problem and the second is an extension to a certificateless key agreement protocol. Both protocols depend on the use of an authentication message to check that the shared session key is equal for both entities before using it. This authentication message prevents the key off-set attack that is valid for the Haiyan-Sun protocol (2). The security analysis of the second protocol is discussed. The proposed certificateless key agreement protocol is compared with other protocols in literature (2,3,4) and it requires minimal computational cost. Moreover, this protocol is implemented using the Mathematica (7) program.

[1]  Sk Hafizul Islam,et al.  An improved pairing-free identity-based authenticated key agreement protocol based on ECC , 2012 .

[2]  Qiaoyan Wen,et al.  A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices , 2013, Information Technology and Control.

[3]  Zhou Yuezhi Certificateless two-party authenticated key agreement protocol based on bilinear pairings , 2012 .

[4]  Colleen M. Swanson,et al.  Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .

[5]  Chik How Tan,et al.  Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.

[6]  Futai Zhang,et al.  Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing , 2009, 2009 International Conference on Computational Intelligence and Security.

[7]  Rui Zhang,et al.  A new two-round certificateless authenticated key agreement protocol without bilinear pairings , 2011, Mathematical and computer modelling.

[8]  Debiao He,et al.  An efficient certificateless authenticated key agreement protocol without bilinear pairings , 2011, IACR Cryptology ePrint Archive.

[9]  Sahadeo Padhye,et al.  An efficient certificateless two-party authenticated key agreement protocol , 2012, Comput. Math. Appl..

[10]  Sahadeo Padhye,et al.  A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..

[11]  Guomin Yang,et al.  Strongly secure certificateless key exchange without pairing , 2011, ASIACCS '11.

[12]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[13]  A. Galloway Protocol , 2006, The SAGE Encyclopedia of Research Design.

[14]  Fatma Ahmed,et al.  A New Efficient Protocol for Authenticated Key Agreement , 2013 .

[15]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[16]  Colin Boyd,et al.  Strongly Secure Certificateless Key Agreement , 2009, Pairing.

[17]  Liqun Chen,et al.  Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.

[18]  Josep Domingo-Ferrer,et al.  Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..

[19]  Jianhua Li,et al.  Two-party authenticated key agreement in certificateless public key cryptography , 2006, Wuhan University Journal of Natural Sciences.

[20]  O Hyong-Chol,et al.  An Efficient Bilinear Pairing-Free Certificateless Two-Party Authenticated Key Agreement Protocol in the eCK Model , 2013, 1304.0383.

[21]  Yong-Jin Kim,et al.  An efficient pairing-free certificateless two-party authenticated key agreement protocol in the eCK model , 2013, ArXiv.

[22]  Li Jianhua,et al.  Two-party authenticated key agreement in certificateless public key cryptography , 2007 .

[23]  Qiuliang Xu,et al.  A Two-party certificateless authenticated key agreement protocol without pairing , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[24]  Alfred Menezes,et al.  Key Agreement Protocols and Their Security Analysis , 1997, IMACC.

[25]  Shao Zu-hua,et al.  Efficient authenticated key agreement protocol using self-certified public keys from pairings , 2008, Wuhan University Journal of Natural Sciences.