Provable Secure Pairing-Free Certificate-Less Authenticated Key Agreement Protocol

Security and efficiency are the main grid authentication protocols objectives. Practical efficient certificate-less public key cryptography-based authentication protocol is widely acknowledged as a challenging issue in grid computing environment. Unfortunately, certificate-less authenticated key agreement protocols rely on bilinear pairing that is extremely computational expensive. A recently published protocol claims meeting some attacks, however, there are some shortcomings in such a protocol. In this paper, such a competing protocol is mathematically criticized. Then, a secure and efficient grid pairing-free certificate-less two-party authenticated key agreement protocol is proposed for grid computing. Finally, the proposed protocol is mathematically proved as secure and efficient in the Lippold model, a very strong security model, under the gap Diffie-Hellman assumption.

[1]  Sahadeo Padhye,et al.  An efficient certificateless two-party authenticated key agreement protocol , 2012, Comput. Math. Appl..

[2]  Colin Boyd,et al.  Strongly Secure Certificateless Key Agreement , 2009, Pairing.

[3]  Amr Farouk,et al.  Authentication mechanisms in grid computing environment: Comparative study , 2012, 2012 International Conference on Engineering and Technology (ICET).

[4]  Colleen M. Swanson,et al.  Security in Key Agreement: Two-Party Certificateless Schemes , 2008 .

[5]  Rui Zhang,et al.  A new two-round certificateless authenticated key agreement protocol without bilinear pairings , 2011, Mathematical and computer modelling.

[6]  Benedikt Schmidt,et al.  Formal analysis of key exchange protocols and physical protocols , 2012 .

[7]  B. Soh,et al.  Applications of Pairings in GRID Security , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[8]  Ian T. Foster,et al.  A security architecture for computational grids , 1998, CCS '98.

[9]  Qiaoyan Wen,et al.  A novel pairing-free certificateless authenticated key agreement protocol with provable security , 2013, Frontiers of Computer Science.

[10]  Zhenfu Cao,et al.  Efficient Certificateless Authentication and Key Agreement (CL-AK) for Grid Computing , 2008, Int. J. Netw. Secur..

[11]  Mohamed M. Fouad,et al.  Protocol Cryptography Problem 1 Security Model 2 Security Weakness , 2014 .

[12]  Futai Zhang,et al.  Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing , 2009, 2009 International Conference on Computational Intelligence and Security.