An efficient pairing-free certificateless two-party authenticated key agreement protocol in the eCK model

Recent study on certificateless authenticated key agreement focuses on bilinear pairing-free certificateless authenticated key agreement protocol. Yet it has got limitations in the aspect of computational amount. So it is important to reduce the number of the scalar multiplication over elliptic curve group in bilinear pairing-free protocols. This paper proposed a new bilinear pairing-free certificateless two-party authenticated key agreement protocol, providing more efficiency among related work and proof under the random oracle model.

[1]  Colin Boyd,et al.  Strongly Secure Certificateless Key Agreement , 2009, Pairing.

[2]  Josep Domingo-Ferrer,et al.  Simulatable certificateless two-party authenticated key agreement protocol , 2010, Inf. Sci..

[3]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[4]  Guomin Yang,et al.  Strongly secure certificateless key exchange without pairing , 2011, ASIACCS '11.

[5]  Qiuliang Xu,et al.  A Two-party certificateless authenticated key agreement protocol without pairing , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[6]  Mihir Bellare,et al.  Authenticated Key Exchange Secure against Dictionary Attacks , 2000, EUROCRYPT.

[7]  Hugo Krawczyk,et al.  Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels , 2001, EUROCRYPT.

[8]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .

[9]  Futai Zhang,et al.  Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing , 2009, 2009 International Conference on Computational Intelligence and Security.

[10]  Liqun Chen,et al.  Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.

[11]  Kristin E. Lauter,et al.  Stronger Security of Authenticated Key Exchange , 2006, ProvSec.

[12]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[13]  Mihir Bellare,et al.  Provably secure session key distribution: the three party case , 1995, STOC '95.

[14]  Li Jianhua,et al.  Two-party authenticated key agreement in certificateless public key cryptography , 2007 .

[15]  Sahadeo Padhye,et al.  A pairing‐free certificateless authenticated key agreement protocol , 2012, Int. J. Commun. Syst..

[16]  Mihir Bellare,et al.  Entity Authentication and Key Distribution , 1993, CRYPTO.

[17]  A. P. Balachandran,et al.  Mixed states from anomalies , 2011, 1108.3898.