An efficient certificateless two-party authenticated key agreement protocol
TLDR
This paper proposes a new pairing-free CLAKA protocol that has better performance and is provably secure in a very strong security model-the extended Canetti-Krawczyk (eCK) model.Abstract:
Since certificateless public key cryptography (CLPKC) has received widespread attention due to its efficiency in avoiding key escrow problems in identity-based public key cryptography (ID-PKC), the certificateless authenticated key agreement (CLAKA) protocol, an important part of CLPKC, has been studied a great deal. Most CLAKA protocols are built from pairings which need costly operations. To improve the performance, several pairing-free CLAKA protocols have been proposed. In this paper, we propose a new pairing-free CLAKA protocol. Compared with the related protocols, our protocol has better performance. Also, our protocol is provably secure in a very strong security model-the extended Canetti-Krawczyk (eCK) model.read more
Citations
More filters
Journal ArticleDOI
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks
TL;DR: A security analysis of the proposed CLPA scheme shows that it is provably secure against two types of adversaries (i.e., a type-I adversary can replace users' public keys, and atype-II adversary can access the master key) in an environment of certificateless cryptography.
Journal ArticleDOI
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing
TL;DR: The detailed analyses provide evidence that the proposed bilinear pairing and MTP hash-function-free CL-MRE scheme with chosen ciphertext attack resilience achieves forward secrecy, backward secrecy, and low computation costs than others.
Journal ArticleDOI
Cryptanalysis and improvement of a three-party key agreement protocol using enhanced Chebyshev polynomials
TL;DR: Security analysis and performance analysis show the proposed improved three-party key agreement protocol using the enhanced Chebyshev chaotic map not only could withstand various attacks, but also has similar performance, which is very suitable for practical applications.
Journal ArticleDOI
Further improvement of a certificateless signature scheme without pairing
Peng Gong,Ping Li +1 more
TL;DR: Security analysis and performance analysis show that the proposed real CLS scheme could enhance security and increase computational cost slightly and that the scheme is secure against the super adversary.
Journal ArticleDOI
Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps
TL;DR: The proposed ECM-3PAKE protocol with key confirmation is shown to be provably secure in the random oracle model and formally validated through the simulation of Automated Validation of Internet Security Protocols and Applications (AVISPA) software.
References
More filters
Book ChapterDOI
Identity-based cryptosystems and signature schemes
TL;DR: In this article, the authors introduce a novel type of cryptographic scheme, which enables any pair of users to communicate securely and to verify each other's signatures without exchanging private or public keys, without keeping key directories, and without using the services of a third party.
Proceedings ArticleDOI
Random oracles are practical: a paradigm for designing efficient protocols
Mihir Bellare,Phillip Rogaway +1 more
TL;DR: It is argued that the random oracles model—where all parties have access to a public random oracle—provides a bridge between cryptographic theory and cryptographic practice, and yields protocols much more efficient than standard ones while retaining many of the advantages of provable security.
Book ChapterDOI
Entity authentication and key distribution
Mihir Bellare,Phillip Rogaway +1 more
TL;DR: This work provides the first formal treatment of entity authentication and authenticated key distribution appropriate to the distributed environment and presents a definition, protocol, and proof that the protocol meets its goal, assuming only the existence of a pseudorandom function.
Book ChapterDOI
Certificateless Public Key Cryptography
TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.
Journal Article
Certificateless public key cryptography
TL;DR: In this article, the concept of certificateless public key cryptography (CL-PKC) was introduced and made concrete, which does not require certificates to guarantee the authenticity of public keys.