• DocumentCode
    567187
  • Title

    Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol

  • Author

    Mohamed, Nashwa A F ; Hashim, Mohsin H A ; Bashier, Eihab B M ; Hassouna, Mohamed E H

  • Author_Institution
    Fac. of Math. Sci., Univ. of Khartoum, Khartoum, Sudan
  • fYear
    2012
  • fDate
    10-12 June 2012
  • Firstpage
    167
  • Lastpage
    172
  • Abstract
    Most of the certificateless two-party authenticated key agreement protocols (CTAKA) found in the literature, suffer either serious security problems making them vulnerable to types of attacks or inefficient performance that involves high computational costs. In this paper, we design an secure and efficient CTAKA. Within the proposed scheme, the KGC possesses a certificate to prove its identity to the communicating parties. The communications between the KGC and each party is secured by the SSL protocol. Each of the two communicating parties are able to compute the same secret symmetric key without any interaction between them. The protocol is fully secure against type 1 attack and fully secure against type 2 attack under the assumptions that the KGC is an honest party and each party within the network has the full capability to keep its secret values safe. Moreover, the setup of the protocol does not include pairings, does not require interactions between communicating parties during the key agreement process, and it require only one scalar multiplications over elliptic curves and one hash for the key agreement, which makes the computational cost for the key agreement comes below the computational costs of all the pairing free CTAKAs found in the literature.
  • Keywords
    cryptographic protocols; public key cryptography; CTAKA; KGC; SSL protocol; certificateless two-party authenticated key agreement protocol; elliptic curve; pairing-free certificateless authenticated key agreement protocol; scalar multiplication; secret symmetric key; security problem; Computational efficiency; Computational modeling; Helium; Protocols; Public key; Authenticated key agreement protocol; Certificateless cryptography; Elliptic curves; Pairing; man in the middle attack;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Internet Security (WorldCIS), 2012 World Congress on
  • Conference_Location
    Guelph, ON
  • Print_ISBN
    978-1-4673-1108-3
  • Type

    conf

  • Filename
    6280220