Provably secure and efficient certificateless authenticated tripartite key agreement protocol

Abstract Authenticated key agreement (AKA) protocols are multi-party protocols in which entities exchange public information allowing them to create a common secret key that is known only to those entities over an open network. Recently, in order to circumvent the key escrow problem inherent to ID-based cryptography and the certificate management burden in traditional public key infrastructure, the notion of certificateless public key cryptography (CL-PKC) was introduced. In this paper, we first present a security model for certificateless AKA protocols for three parties, and then propose an efficient construction based on bilinear pairings. The security of the proposed scheme can be proved to be equivalent to the computational Diffie–Hellman problem in the random oracle model.

[1]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[2]  Tsuyoshi Takagi,et al.  An id-based non-interactive tripartite key agreement protocol with K-resilience , 2005, Communications and Computer Networks.

[3]  Divya Nalla ID-based tripartite key agreement with signatures , 2003, IACR Cryptol. ePrint Arch..

[4]  Kyung-Ah Shim Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols , 2003, IACR Cryptol. ePrint Arch..

[5]  Sanggon Lee,et al.  Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol , 2007, ICISS.

[6]  Kwangjo Kim,et al.  ID-Based One Round Authenticated Tripartite Key Agreement Protocol with Pairings , 2002, IACR Cryptol. ePrint Arch..

[7]  Xiaoni Du,et al.  A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges , 2010, Inf. Sci..

[8]  Robert H. Deng,et al.  Variations of Diffie-Hellman Problem , 2003, ICICS.

[9]  Zhenfu Cao,et al.  Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..

[10]  Meng Gao,et al.  An Efficient Certificateless Authenticated Tripartite Key Agreement Protocol , 2009, 2009 International Conference on Management and Service Science.

[11]  Chu-Hsing Lin,et al.  Weakness of shim¡¦s New ID-based tripartite multiple-key agreement protocol , 2005, IACR Cryptol. ePrint Arch..

[12]  Yong Yu,et al.  Identity-Based Authenticated Key Agreement Protocols without Bilinear Pairings , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[13]  Kenneth G. Paterson,et al.  Tripartite Authenticated Key Agreement Protocols from Pairings , 2003, IMACC.

[14]  Burton S. Kaliski,et al.  An unknown key-share attack on the MQV key agreement protocol , 2001, ACM Trans. Inf. Syst. Secur..

[15]  David Jao,et al.  A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols , 2009, INDOCRYPT.

[16]  Josep Domingo-Ferrer,et al.  Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..

[17]  Antoine Joux A One Round Protocol for Tripartite Diffie-Hellman , 2000, ANTS.

[18]  Zhong Chen,et al.  Toward Pairing-Free Certificateless Authenticated Key Exchanges , 2011, ISC.

[19]  Lei Zhang,et al.  A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.

[20]  Sanggon Lee,et al.  An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol , 2007, IACR Cryptol. ePrint Arch..

[21]  Marko Hölbl,et al.  Two proposed identity-based three-party authenticated key agreement protocols from pairings , 2010, Comput. Secur..

[22]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[23]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[24]  Colin Boyd,et al.  Strongly Secure Certificateless Key Agreement , 2009, Pairing.

[25]  Kyung-Ah Shim,et al.  Efficient one round tripartite authenticated key agreement protocol from Weil pairing , 2003 .

[26]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[27]  Chik How Tan,et al.  Certificateless Authenticated Two-Party Key Agreement Protocols , 2006, ASIAN.

[28]  Kenneth G. Paterson,et al.  Modular Security Proofs for Key Agreement Protocols , 2005, ASIACRYPT.

[29]  Peter Nose Security weaknesses of authenticated key agreement protocols , 2011, Inf. Process. Lett..

[30]  Kyung-Ah Shim,et al.  Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings , 2005, Appl. Math. Comput..

[31]  Juan Manuel González Nieto,et al.  Certificateless Key Agreement in the Standard Model , 2010, AISC.

[32]  K. C. Reddy,et al.  ID-based tripartite Authenticated Key Agreement Protocols from pairings , 2003, IACR Cryptol. ePrint Arch..