Advertisement

PF-AID-2KAP: Pairing-Free Authenticated Identity-Based Two-Party Key Agreement Protocol for Resource-Constrained Devices

  • Mahender Kumar
  • P. C. Saxena
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 958)

Abstract

An adequate construction of shared session key for wireless-resource constrained devices is a challenging task than conventional wired, memory and power-rich devices. Since several two-party key establishment schemes have been proposed but they are not suitable for resource-constrained devices. It has been seen that pairing operations on elliptic curves are computationally more costly than scalar multiplication and addition operations on the elliptic curve. In this article, we proposed pairing-free two-party authenticated ID-based key agreement protocol (PF-AID-2KAP) for such resource constrained devices. Under the assumption to solve ECDLP and CDHP problems, the propose PF-AID-2KAP scheme is provably secure. Further, we show that the key agreement scheme is resilience to following adversarial attacks: perfect forward secrecy, MITM attack, key control, known session key security. As compared to other schemes, our proposed system have less running time, less bandwidth cost and takes less number message exchange during communication.

Keywords

Identity based cryptosystem Elliptic curve cryptosystem Key agreement protocol Resource- constrained devices 

Notes

Acknowledgements

This research work has been partially supported by the Council of Scientific and Industrial Research, a research and development organization in India, with sanctioned no. 09/263(1052)/2015 EMR-I and the UPE-II grant received from JNU. Additionally, the author would like to sincere thanks to the anonymous reviewers for their fruitful comments.

References

  1. 1.
    Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., Ayyash, M.: Internet of Things: a survey on enabling technologies, protocols, and applications. IEEE Commun. Surv. Tutorials 17(4), 2347–2376 (2015)CrossRefGoogle Scholar
  2. 2.
    Botta, A., De Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and Internet of Things: a survey. Future Gener. Comput. Syst. 56, 684–700 (2016)CrossRefGoogle Scholar
  3. 3.
    Sheng, Z., Wang, H., Yin, C., Hu, X., Yang, S., Leung, V.C.M.: Lightweight management of resource-constrained sensor devices in Internet of Things. IEEE Internet Things J. 2(5), 402–411 (2015)CrossRefGoogle Scholar
  4. 4.
    Oliveira, L.B., Aranha, D.F., Morais, E., Daguano, F., López, J., Dahab, R.: Tinytate: computing the tate pairing in resource-constrained sensor nodes. In: Sixth IEEE International Symposium on Network Computing and Applications, NCA 2007, pp. 318–323 (2007)Google Scholar
  5. 5.
    Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Vanstone, S.A.: Elliptic curve cryptosystem—the answer to strong, fast public-key cryptography for securing constrained environments. Inf. Secur. Tech. Rep. 2(2), 78–87 (1997)CrossRefGoogle Scholar
  7. 7.
    Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: Verdone, R. (ed.) Wireless Sensor Networks. EWSN 2008. LNCS, vol. 4913, pp. 305–320. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-77690-1_19CrossRefGoogle Scholar
  8. 8.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985).  https://doi.org/10.1007/3-540-39568-7_5CrossRefGoogle Scholar
  9. 9.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-44647-8_13CrossRefGoogle Scholar
  10. 10.
    Choon, J.C., Hee Cheon, J.: An identity-based signature from gap diffie-hellman groups. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 18–30. Springer, Heidelberg (2003).  https://doi.org/10.1007/3-540-36288-6_2CrossRefGoogle Scholar
  11. 11.
    Chatterjee, S., Sarkar, P.: Identity-Based Encryption. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-1-4419-9383-0CrossRefzbMATHGoogle Scholar
  12. 12.
    Kumar, M., Katti, C.P., Saxena, P.C.: A secure anonymous e-voting system using identity-based blind signature scheme. In: Shyamasundar, Rudrapatna K., Singh, V., Vaidya, J. (eds.) ICISS 2017. LNCS, vol. 10717, pp. 29–49. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-72598-7_3CrossRefGoogle Scholar
  13. 13.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45682-1_30CrossRefGoogle Scholar
  14. 14.
    Kumar, M., Katti, C.P., Saxena, P.C.: An untraceable identity-based blind signature scheme without pairing for e-cash payment system. In: Kumar, N., Thakre, A. (eds.) UBICNET 2017. LNICST, vol. 218, pp. 67–78. Springer, Cham (2018).  https://doi.org/10.1007/978-3-319-73423-1_7CrossRefGoogle Scholar
  15. 15.
    Wang, S., Cao, Z., Choo, K.-K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. (Ny) 179(3), 307–318 (2009)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Chen, L., Cheng, Z., Smart, N.P.: Identity-based key agreement protocols from pairings. Int. J. Inf. Secur. 6(4), 213–241 (2007)CrossRefGoogle Scholar
  17. 17.
    Kumar, M., Katti, C.P., Saxena, P.C.: An ID-based authenticated key exchange protocol. Int. J. Adv. Stud. Comput. Sci. Eng. 4(5), 11 (2015)Google Scholar
  18. 18.
    Hölbl, M., Welzer, T., Brumen, B.: An improved two-party identity-based authenticated key agreement protocol using pairings. J. Comput. Syst. Sci. 78(1), 142–150 (2012)MathSciNetCrossRefGoogle Scholar
  19. 19.
    He, D., Chen, J., Hu, J.: A pairing-free certificateless authenticated key agreement protocol. Int. J. Commun. Syst 25(2), 221–230 (2012)CrossRefGoogle Scholar
  20. 20.
    Tseng, Y.-M., Huang, S.-S., Tsai, T.-T., Tseng, L.: A novel ID-Based authentication and key exchange protocol resistant to ephemeral-secret-leakage attacks for mobile devices. Int. J. Distrib. Sens. Netw. 11(5), 898716 (2015)CrossRefGoogle Scholar
  21. 21.
    Islam, S.K.H., Biswas, G.P.: A pairing-free identity-based two-party authenticated key agreement protocol for secure and efficient communication. J. King Saud Univ. Inf. Sci. 29, 63–73 (2015)Google Scholar
  22. 22.
    Tseng, Y., Huang, S., You, M.: Strongly secure ID‐based authenticated key agreement protocol for mobile multi‐server environments. Int. J. Commun. Syst. 30(11) (2017)CrossRefGoogle Scholar
  23. 23.
    Cao, X., Kou, W., Yu, Y., Sun, R.: Identity-based authenticated key agreement protocols without bilinear pairings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91(12), 3833–3836 (2008)CrossRefGoogle Scholar
  24. 24.
    Cao, X., Kou, W., Du, X.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. (Ny) 180(15), 2895–2903 (2010)MathSciNetCrossRefGoogle Scholar
  25. 25.
    Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)MathSciNetCrossRefGoogle Scholar
  26. 26.
    Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986).  https://doi.org/10.1007/3-540-39799-X_31CrossRefGoogle Scholar
  27. 27.
    Shparlinski, I.: Computational diffie-hellman problem. In: van Tilborg, H.C.A., Jajodia, S. (eds.) Encyclopedia of Cryptography and Security, pp. 240–244. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-1-4419-5906-5CrossRefGoogle Scholar
  28. 28.
    Xiong, X., Wong, D.S., Deng, X.: TinyPairing: a fast and lightweight pairing-based cryptographic library for wireless sensor networks. In: 2010 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6 (2010)Google Scholar
  29. 29.
    Messer, A., et al.: Towards a distributed platform for resource-constrained devices. In: Proceedings of the 22nd International Conference on Distributed Computing Systems, pp. 43–51 (2002)Google Scholar
  30. 30.
    Sehgal, A., Perelman, V., Kuryla, S., Schonwalder, J.: Management of resource constrained devices in the Internet of Things. IEEE Commun. Mag. 50(12) (2012)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.School of Computer and Systems SciencesJawharlal Nehru UniversityNew DelhiIndia

Personalised recommendations