Title :
Certificateless Two Party Key Agreement Protocol
Author :
Wenhao, Liu ; Chunxiang, Xu ; Jian, Xu
Author_Institution :
Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China
Abstract :
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure. The provably secure certificateless key agreement protocol is proposed by Lippold et al. in 2009, but their protocol suffers from computation burden. Owing to the above-mentioned situations, a new certificateless two party key agreement protocol (CL-KA) is proposed and the security attributes are analyzed in the extended Canetti-Krawzcyk(eCK) security model. Our protocol only requires each entity to compute two pairings, up to now, it turns out to be the most efficient one of all the previously known security CL-KA schemes.
Keywords :
cryptographic protocols; public key cryptography; Canetti Krawzcyk security model; certificateless cryptography; certificateless two party key agreement protocol; key escrow problem; public key cryptography; Computational modeling; Protocols; Public key cryptography; Resilience; certificateless; eCK security model; key agreement; two party;
Conference_Titel :
Multimedia Information Networking and Security (MINES), 2010 International Conference on
Conference_Location :
Nanjing, Jiangsu
Print_ISBN :
978-1-4244-8626-7
Electronic_ISBN :
978-0-7695-4258-4
DOI :
10.1109/MINES.2010.116