Title :
Certificateless Key Agreement Protocol
Author_Institution :
Sch. of Comput. Sci., Hubei Univ. of Technol., Wuhan, China
Abstract :
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure. A new two party certificateless key agreement protocol (CL-KA) is proposed and we proved it secure in the random oracle model (ROM). Our protocol only requires each entity to compute one pairing, up to now, it turns out to be the most efficient one of all the previously known CL-KA schemes.
Keywords :
protocols; public key cryptography; set theory; bilinear pairing; certificate management; certificateless cryptography; identity based cryptography; key escrow problem; public key cryptography; random oracle model; two party certificateless key agreement protocol; Computer science; Cryptographic protocols; Data security; Identity management systems; Identity-based encryption; Information security; Public key; Public key cryptography; Read only memory; Resilience;
Conference_Titel :
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-5893-6
Electronic_ISBN :
978-1-4244-5895-0
DOI :
10.1109/EBISS.2010.5473707