With rapid growth of mobile wireless networks, handheld devices are popularly used by people and many mobile applications have been rapidly developed. Mutual authentication and key agreement are very important security mechanisms in wireless network systems for preventing unauthorized network access, server impersonation attack and malicious attacks of the subsequent session message. Considering the limited computing capability of smart cards or mobile devices, the security scheme design suitable for these mobile devices is a nontrivial challenge. This paper presents an authentication and key agreement mechanism for multi-domain wireless networks using certificateless public key cryptography. Based on the computational Diffie–Hellman assumption and the random oracle model, we show that the proposed scheme is secure against an uncertified user and a malicious registration server simultaneously. As compared with the recently proposed schemes, our scheme enjoys less computational cost on the basis of BLS short signature scheme and has higher security level by exploiting the certificateless public key cryptography system. Moreover, our scheme can be used to mutual authentication and key agreement between members of distinct domains where all the servers use different system parameters. Efficiency analysis of related the security and computation overheads are given to demonstrate that our scheme is well suited for mobile devices with limited computing capability.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in cryptology - CRYPTO’84 (pp. 47–53). Berlin, Germany.
Gentry, C. (1984). Certificate-based encryption and the certificate revocation problem. In Advances in cryptology-EUROCRPYT 2003 (pp. 272–293). Berlin, Germany.
Al-Riyami, S. S., & Paterson, K.G. (2003). Certificateless public key cryptography. In Advances in cryptography-ASIACRYPT 2003 (pp. 452–473). Berlin, Germany.
Choi, K. Y., Park, J. H., Hwang, J. Y., & Lee, D. H. (2007). Efficient certificateless signature schemes. In advances in ACNS 2007 (pp. 443–458). Berlin, Germany.
Zhang, G., & Wang, S. (2008). A certificateless signature and group signature schemes against malicious PKG. In Proceedings of 22nd international conference on advanced information networking and applications (AINA 2008), GinoWan, Okinawa, Japan.
Xu, Z., Liu, X., Zhang, G. Q., & He, W. B. (2008). A certificateless signature scheme for mobilewireless cyber-physical systems. In Proceedings of the 28th international conference on distributed computing systems workshops (ICDCS’08), Beijing, China.
Mandt, T. K., & Tan, C. H. (2006). Certificateless authenticated two-party key agreement protocols. In advances in the 11th Asian computing science conference (pp. 37–44), Tokyo, Japan.
Luo, M., Wen, Y. Y., & Zhao, H. (2008). An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In Proceedings of the 9th international conference for young computer scientists (ICYCS’08), Zhang Jia Jie, Hunan, China.
Lee, E. J., Lee S. E., & Yoo, K. Y. (2008). A certificateless authenticated group key agreement protocol providing forward secrecy. In Proceedings of ubiquitous multimedia computing, 2008 (UMC’08), Wrestpoint Hotel, Hobart, Australia.
Boneh, D., Lynn B., & Shacham, H. (2001). Short signatures from the weil pairing. In Advances in cryptology-Asiacrypt 2001 (pp. 514–532). Berlin, Germany.
Du H. Z., & Wen, Q. Y. (2007). Efficient and provably-secure certificateless short signature scheme from Bilinear Pairings. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2007/250.pdf
Tso, R., Yi, X., & Huang, X. Y. (2008). Efficient and short certificateless signature. In Proceedings of the 7th international conference on cryptology and network security (CANS 2008), Hong-Kong, China.
Das, M. L., Saxena, A., Gulati, V. P., & Phatak, D. B. (2006). A novel remote user authentication scheme using bilinear pairings. Computers and Security, 25(3), 184–189.
Goriparthi, T., Das, M. L., Negi, A., & Saxena, A. (2006). Cryptanalysis of recently proposed remote user authentication schemes. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2006/028.pdf
Giri, D., & Srivastava, P. D. (2006). An improved remote user authentication scheme with smart cards using bilinear pairings. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2006/274.pdf
Tseng, Y. M., Wu, T. Y., & Wu, J. D. (2007). A mutual authentication and key exchange scheme from bilinear pairings for low power computing devices. In Proceedings of the 31st annual international computer software and applications conference (COMPSAC 2007), Beijing, China.
Tseng, Y. M., Wu, T. Y., & Wu, J. D. (2008). A pairing-based user authentication scheme for wireless clients with smart cards. Informatica, 19(2), 285–302.
Boneh, D., & Franklin, M. (2001). Identity-based encryption from the Weil pairing. In Advances in cryptology-CRYPTO 2001 (pp. 213–229). Berlin, Germany.
Boneh, D., & Franklin, M. (2003). Identity based encryption from the Weil pairing. SIAM Journal on Computing, 32(3), 586–615.
Bellare, M., & Rogaway, P. (1993). Random oracles are practical: a paradigm for designing efficient protocols. In Proceedings of the 1st annual ACM conference on computer and communications security (ACM CCS’93), Fairfax, Virginia, USA.
Zhang, Z., Wong, D. S., Xu, J., & Feng, D. (2006). Certificateless public-key signature: security model and efficiet construction. In advances in ACNS 2006 (pp. 293–308). Berlin, Germany.
Goldwasser, S., Micali, S., & Rivest, R. L. (1988). A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing, 17(2), 281–308.
Blake-Wilson, S., Johnson, D., & Menezes, A. (1997). Key agreement protocols and their security analysis. In advances in the sixth IMA international conference on cryptography and coding (pp. 30–45). Berlin, Germany.
Cheng, Z., Nistazakis, M., Vasiu, L. (2005). On the indistinguishability-based security model of key agreement protocols—simple cases. Cryptology ePrint archive, Retrieved from: http://eprint.iacr.org/2005/129.pdf
Ku, W. C., & Chang, S. T. (2005). Impersonation attack on a dynamic id-based remote user authentication scheme using smart cards. IEICE Transactions on Communications, E88–B(5), 2165–2167.
Liaw, H. T., Lin, J. F., & Wu, W. C. (2006). An efficient and complete remote user authentication scheme using smart cards. Mathematical and Computer Modelling, 44, 223–228.
Lauther, K., & Mityagin, A. (2006). Security analysis of KEA authenticated key exchange protocol. In Advances in PKC 2006 (pp. 378–394). Berlin, Germany.
Luo, M., Yan, Q. J., Jiang, G. Q., & Xu, J. F. (2012). An authentication and key agreement mechanism for multi-domain wireless networks using bilinear pairings. In Advances in IWIEE 2012 (pp. 2649–2654). Harbin, China.
We would like to thank the anonymous reviewers for their valuable comments and suggestions. This work is supported by the National Natural Science Foundation of China under contract no. 60803131 and the research project of Jiangxi Province under contract no. GJJ13084, JXJG-13-1-46, 20132BBE50042, 20132BAB211028, 20133BBE50037 and JXYJG-2014-24.
This is the extended version of a paper that appeared in IWIEE 2012 .
About this article
Cite this article
Luo, M., Zhao, H. An Authentication and Key Agreement Mechanism for Multi-domain Wireless Networks Using Certificateless Public-Key Cryptography. Wireless Pers Commun 81, 779–798 (2015). https://doi.org/10.1007/s11277-014-2157-5
- Mutual authentication
- Key agreement
- Certificateless public key cryptography
- Smart card
- Bilinear pairing