Certificateless Authenticated Two-Party Key Agreement Protocols

  • Tarjei K. Mandt
  • Chik How Tan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4435)

Abstract

In their seminal paper on certificateless public key cryptography, Al-Riyami and Paterson (AP) proposed a certificateless authenticated key agreement protocol. Key agreement protocols are one of the fundamental primitives of cryptography, and allow users to establish session keys securely in the presence of an active adversary. AP’s protocol essentially requires each party to compute four bilinear pairings. Such operations can be computationally expensive, and should therefore be used moderately in key agreement. In this paper, we propose a new certificateless authenticated two-party key agreement protocol that only requires each party to compute two pairings. We analyze the security of the protocol and show that it achieves the desired security attributes. Furthermore, we show that our protocol can be used to establish keys between users of different key generation centers.

Keywords

Certificateless public key cryptography authenticated key agreement bilinear map 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Riyami, S.S., Paterson, K.: Certificateless Public Key Cryptography. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 452–473. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman Key Agreement Protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Cheng, Z., Nistazakis, M., Comley, R., Vasiu, L.: On The Indistinguishability-Based Security Model of Key Agreement Protocols - Simple Cases. Technical Track Proceedings, Journal of China Information Security. ICISA Press (2004)Google Scholar
  5. 5.
    Mandt, T.K.: Certificateless Authenticated Two-Party Key Agreement Protocols. Master’s Thesis. Gjøvik University College (2006)Google Scholar
  6. 6.
    Mitchell, C.J., Ward, M., Wilson, P.: Key Control in Key Agreement Protocols. Electronics Letters 34, 980–981 (1998)CrossRefGoogle Scholar
  7. 7.
    Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Tarjei K. Mandt
    • 1
  • Chik How Tan
    • 1
  1. 1.Norwegian Information Security Laboratory Department of Computer Science and Media TechnologyGjøvik University CollegeGjøvikNorway

Personalised recommendations