Title :
Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing
Author :
Geng, Manman ; Zhang, Futai
Author_Institution :
Coll. of Comput. Sci. & Technol., Nanjing Normal Univ., Nanjing, China
Abstract :
Key agreement is one of the fundamental cryptographic primitives in public key cryptography. So far several certificateless two-party authenticated key agreement (CL-T-AKA) protocols have been proposed. However, all these protocols are based on bilinear map and most of them are without formal security proof. In this paper, we present a new formal security model of CL-T-AKA protocols and bring forward the first two-party key agreement protocol without the computation of expensive bilinear map. Our protocol is secure under the security model assuming the Gap-DH problem is intractable. With respect to efficiency, our protocol requires a single round of communication in which each party sends only one group element, and needs only five modular exponentiation computations. In addition, we point out that an existing certificateless two-party key agreement protocol cannot resist man-in-the-middle attack.
Keywords :
authorisation; cryptographic protocols; formal specification; public key cryptography; CL-T-AKA protocol; Gap-DH problem; certificateless two-party authenticated key agreement protocol; formal security model; modular exponentiation computation; public key cryptography; Authentication; Computational intelligence; Computer science; Cryptographic protocols; Educational institutions; Elliptic curve cryptography; Identity-based encryption; Information security; Public key; Public key cryptography; authenticated key agreement; certificateless public key cryptography; computational Diffie-Hellman problem; pairing;
Conference_Titel :
Computational Intelligence and Security, 2009. CIS '09. International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-5411-2
DOI :
10.1109/CIS.2009.152