期刊文献+

A novel pairing-free certificateless authenticated key agreement protocol with provable security 被引量:10

A novel pairing-free certificateless authenticated key agreement protocol with provable security
原文传递
导出
摘要 Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap DiffieHellman (GDH) assumption. Furthermore, the proposed protocol is very efficient. Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap DiffieHellman (GDH) assumption. Furthermore, the proposed protocol is very efficient.
出处 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第4期544-557,共14页 中国计算机科学前沿(英文版)
关键词 ATTACKS PAIRINGS eCK model provable security certificateless authenticated key agreement attacks, pairings, eCK model, provable security,certificateless authenticated key agreement
  • 相关文献

参考文献1

二级参考文献8

  • 1Cheng Z H,Comley R.Efficient Certificateless Public Key Encryption. http://eprint.iacr.org/ 2005/012.pdf . 2005
  • 2Barua R,Dutta R,Sarkar P.Extending Joux’s Protocol to Multi Party Key Agreement. http: //eprint.iacr.org/2003/062.pdf . 2003
  • 3Cheng Z H,,Comley R,Vasiu L.Remove Key Escrow from the Identity-Based Encryption System[].Foundations of Information Technology in the Era of Network and Mobile Computing.2004
  • 4Al-Riyami S S,,Paterson K G.Certificateless Public Key Cryptography[].Lecture Notes in Computer Science.2003
  • 5Yum D H,,Lee P J.Generic Construction of Certificateless Encryption[].Lecture Notes in Computer Science.2004
  • 6Al-Riyami S S,,Paterson K G.CBE from CL-PKE: A Generic Construction and Efficient Schemes[].Lecture Notes in Computer Science.2005
  • 7Chen L,Kudla C.Identity Based Authenticated Key Agreement from Pairings. http: //eprint.iacr.org/2002/184.pdf . 2002
  • 8Yum D H,Lee P J.Generic Construction of Certificateless Signature[].Lecture Notes in Computer Science.2004

共引文献22

同被引文献25

引证文献10

二级引证文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部