Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption

基于CDH假设的强安全的无对的无证书认证密钥协商协议

Abstract

Certificateless authenticated key agreement (CL-AKA) protocols have been studied a great deal since they neither suffer from a heavy certificate management burden nor have the key escrow problem. Recently, many efficient CL-AKA protocols without pairings have been built. However, these pairing-free CL-AKA protocols are either not proved in any formal security model or proved under the gap Diffie-Hellman (GDH) assumption, a non-standard and strong assumption. With available implementation technologies, pairings are needed to realize the GDH assumption, which means that these pairing-free CL-AKA protocols are not pure pairing-free. Furthermore, these protocols are insecure in the strengthened eCK (seCK) model, which encompasses the eCK model and considers leakages on intermediate results. In this paper, we present a pure pairing-free CL-AKA protocol, which is provably secure in the seCK model under the standard computational Diffie-Hellman (CDH) assumption. Compared with the existing CL-AKA protocols, the proposed protocol has advantage over them in security or efficiency.

摘要

创新点

本文提出了一个基于CDH假设的seCK安全的无对的无证书认证密钥协商协议。首先解决了现有的无对的无证书认证密钥协商协议仅基于GDH假设 (一个非标准的且强的假设) 的问题。其次, 解决了现有的无对的无证书认证密钥协商协议不能够满足seCK安全性(seCK安全模型不仅包含了eCK模型, 而且捕捉了临时中间结果泄露抵抗的安全性)的问题。与现存的无证书认证密钥协商协议相比较, 此协议有着安全性或效率的优势。

This is a preview of subscription content, log in to check access.

References

  1. 1

    Shamir A. Identity-based cryptosystems and signature schemes. In: Proceedings of the 4th Annual International Cryptology Conference, Santa Barbara, 1984. 47–53

  2. 2

    Al-Riyami S, Paterson K G. Certificateless public key cryptography. In: Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, 2003. 452–473

  3. 3

    Li H, Wu C K. CMQV+: an authenticated key exchange protocol from CMQV. Sci China Inf Sci, 2012, 55: 1666–1674

  4. 4

    Ni L, Chen G L, Li J H, et al. Strongly secure identity-based authenticated key agreement protocols in the escrow mode. Sci China Inf Sci, 2013, 56: 082113

  5. 5

    Wang S B, Cao Z F, Dong X. Certificateless authenticated key agreement based on the MTI/CO protocol. J Inf Comput Sci, 2006, 3: 575–581

  6. 6

    Shi Y J, Li J H. Two-party authenticated key agreement in certificateless public key cryptography. Wuhan Univ J Nat Sci, 2007, 12: 71–74

  7. 7

    Luo M, Wen Y Y, Zhao H. An enhanced authentication and key agreement mechanism for SIP using certificateless public-key cryptography. In: Proceedings of the 9th International Conference for Young Computer Scientists, Hunan, 2008. 1577–1582

  8. 8

    Mandt T K, Tan C H. Certificateless authenticated two-party key agreement protocols. In: Proceedings of the 11th Asian Computing Science Conference, Tokyo, 2006. 37–44

  9. 9

    Wang F J, Zhang Y Q. A new provably secure authentication and key agreement mechanism for SIP using certificateless public-key cryptography. Comput Commun, 2008, 31: 2142–2149

  10. 10

    Swanson C, Jao D. A study of two-party certificateless authenticated key agreement protocols. In: Proceedings of 10th International Conference on Cryptology in India, New Delhi, 2009. 57–71

  11. 11

    Lippold G, Boyd C, Manuel Gonzalez Nieto J. Strongly secure certificateless key agreement. In: Proceedings of 3rd International Conference on Pairing-Based Cryptography, Palo Alto, 2009. 206–230

  12. 12

    Zhang L, Zhang F T, Wu Q H, et al. Simulatable certificateless two party authenticated key agreement protocol. Inf Sci, 2010, 180: 1020–1030

  13. 13

    He D J, Chen C, Chan S, et al. Secure and efficient handover authentication based on bilinear pairing functions. IEEE Trans Wirel Commun, 2012, 11: 48–53

  14. 14

    Hou M B, Xu Q L. A two-party certificateless authenticated key agreement protocol without pairing. In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information Technology, Beijing, 2009. 412–416

  15. 15

    He D B, Chen Y T, Hu J. A pairing-free certificateless authenticated key agreement protocol. Int J Commun Syst, 2012, 25: 221–230

  16. 16

    He D B, Chen Y T, Chen J H, et al. A new two-round certificateless authenticated key agreement protocol without bilinear pairings. Math Comput Model, 2011, 54: 3143–3152

  17. 17

    Xiong H, Wu Q H, Chen Z. Toward pairing-free certificateless authenticated key exchanges. In: Proceedings of 14th International Conference on Information Security, Xi’an, 2011. 79–94

  18. 18

    Geng M M, Zhang F T. Provably secure certificateless two-party authenticated key agreement protocol without pairing. In: Proceedings of the 2009 International Conference on Computational Intelligence and Security, Jinan, 2009. 208–212

  19. 19

    He D B, Padhye S, Chen J H. An efficient certificateless two-party authenticated key agreement protocol. Comput Math Appl, 2012, 64: 1914–1926

  20. 20

    Yang G M, Tan C H. Strongly secure certificateless key exchange without pairing. In: Proceedings of the 6th ACM Symposium on Information Computer and Communications Security, New York, 2011. 71–79

  21. 21

    Sun H Y, Wen Q Y, Zhang H, et al. A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices. Inf Technol Control, 2013, 42: 113–123

  22. 22

    Sun H Y, Wen Q Y, Zhang H, et al. A novel pairing-free certificateless authenticated key agreement protocol with provable security. Front Comput Sci, 2013, 7: 544–557

  23. 23

    Bellare M, Rogaway P. Entity authentication and key distribution. In: Proceedings of 13th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 1993. 232–249

  24. 24

    Blake-Wilson S, Johnson D, Menezes A. Key agreement protocols and their security analysis. In: Proceedings of 6th IMA International Conference on Cryptography and Coding. Berlin: Springer-Verlag, 1997. 30–45

  25. 25

    Canetti R, Krawczyk H. Analysis of key-exchange protocols and their use for building secure channels. In: Proceedings of International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, 2001. 453–474

  26. 26

    LaMacchia B, Lauter K, Mityagin A. Stronger security of authenticated key exchange. In: Proceedings of 1st International Conference on Provable Security. Berlin: Springer-Verlag, 2007. 1–16

  27. 27

    Sarr A P, Elbaz-Vincent P, Bajard J. A new security model for authenticated key agreement. In: Proceedings of 7th International Conference on Security and Cryptography for Networks, Amalfi, 2010. 219–234

  28. 28

    Boneh D, Gentry C, Lynn B, et al. A survey of two signature aggregation techniques. CryptoBytes, 2003, 6: 1–11

  29. 29

    Cash D, Kiltz E, Shoup V. The twin Diffie-Hellman problem and applications. In: Proceedings of 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, 2008. 127–145

  30. 30

    Pointcheval D, Stern J. Security arguments for digital signatures and blind signatures. J Cryptol, 2000, 13: 361–369

  31. 31

    Shamus Software Ltd. Miracl library. http://www.certivox.com/miracl/

  32. 32

    The Certicom Corporation. SEC2: Recommended domain parameters. Version 1.0, 2000

Download references

Author information

Correspondence to Haiyan Sun.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Sun, H., Wen, Q. & Li, W. A strongly secure pairing-free certificateless authenticated key agreement protocol under the CDH assumption. Sci. China Inf. Sci. 59, 32109 (2016). https://doi.org/10.1007/s11432-015-5303-0

Download citation

Keywords

  • CDH assumption
  • seCK model
  • pairing
  • certificateless cryptography
  • authenticated key agreement

关键词

  • CDH 假设
  • seCK 安全模型
  • 双线性对
  • 无证书密码学
  • 认证密钥协商协议