scispace - formally typeset
Open AccessJournal ArticleDOI

An efficient certificateless two-party authenticated key agreement protocol

TLDR
This paper proposes a new pairing-free CLAKA protocol that has better performance and is provably secure in a very strong security model-the extended Canetti-Krawczyk (eCK) model.
Abstract
Since certificateless public key cryptography (CLPKC) has received widespread attention due to its efficiency in avoiding key escrow problems in identity-based public key cryptography (ID-PKC), the certificateless authenticated key agreement (CLAKA) protocol, an important part of CLPKC, has been studied a great deal. Most CLAKA protocols are built from pairings which need costly operations. To improve the performance, several pairing-free CLAKA protocols have been proposed. In this paper, we propose a new pairing-free CLAKA protocol. Compared with the related protocols, our protocol has better performance. Also, our protocol is provably secure in a very strong security model-the extended Canetti-Krawczyk (eCK) model.

read more

Citations
More filters
Journal ArticleDOI

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks

TL;DR: A security analysis of the proposed CLPA scheme shows that it is provably secure against two types of adversaries (i.e., a type-I adversary can replace users' public keys, and atype-II adversary can access the master key) in an environment of certificateless cryptography.
Journal ArticleDOI

Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing

TL;DR: The detailed analyses provide evidence that the proposed bilinear pairing and MTP hash-function-free CL-MRE scheme with chosen ciphertext attack resilience achieves forward secrecy, backward secrecy, and low computation costs than others.
Journal ArticleDOI

Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials

TL;DR: Security analysis and performance analysis show the proposed improved three-party key agreement protocol using the enhanced Chebyshev chaotic map not only could withstand various attacks, but also has similar performance, which is very suitable for practical applications.
Journal ArticleDOI

Further improvement of a certificateless signature scheme without pairing

TL;DR: Security analysis and performance analysis show that the proposed real CLS scheme could enhance security and increase computational cost slightly and that the scheme is secure against the super adversary.
Journal ArticleDOI

Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps

TL;DR: The proposed ECM-3PAKE protocol with key confirmation is shown to be provably secure in the random oracle model and formally validated through the simulation of Automated Validation of Internet Security Protocols and Applications (AVISPA) software.
References
More filters
Book ChapterDOI

Identity-based cryptosystems and signature schemes

TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Proceedings ArticleDOI

Random oracles are practical: a paradigm for designing efficient protocols

TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Book ChapterDOI

Entity authentication and key distribution

TL;DR: This work provides the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment and presents a definition, protocol, and proof that the protocol meets its goal, assuming only the existence of a pseudorandom function.
Book ChapterDOI

Certificateless Public Key Cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Journal Article

Certificateless public key cryptography

TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Related Papers (5)