Certificateless Authenticated Two-Party Key Agreement Protocols
In their seminal paper on certificateless public key cryptography, Al-Riyami and Paterson (AP) proposed a certificateless authenticated key agreement protocol. Key agreement protocols are one of the fundamental primitives of cryptography, and allow users to establish session keys securely in the presence of an active adversary. AP’s protocol essentially requires each party to compute four bilinear pairings. Such operations can be computationally expensive, and should therefore be used moderately in key agreement. In this paper, we propose a new certificateless authenticated two-party key agreement protocol that only requires each party to compute two pairings. We analyze the security of the protocol and show that it achieves the desired security attributes. Furthermore, we show that our protocol can be used to establish keys between users of different key generation centers.
KeywordsCertificateless public key cryptography authenticated key agreement bilinear map
Unable to display preview. Download preview PDF.
- 4.Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On The Indistinguishability-Based Security Model of Key Agreement Protocols - Simple Cases. Technical Track Proceedings, Journal of China Information Security. ICISA Press (2004)Google Scholar
- 5.Mandt, T.K.: Certificateless Authenticated Two-Party Key Agreement Protocols. Master’s Thesis. Gjøvik University College (2006)Google Scholar