• DocumentCode
    2487136
  • Title

    Certificateless Key Agreement Protocol

  • Author

    Chen Yixiang

  • Author_Institution
    Sch. of Comput. Sci., Hubei Univ. of Technol., Wuhan, China
  • fYear
    2010
  • fDate
    22-23 May 2010
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure. A new two party certificateless key agreement protocol (CL-KA) is proposed and we proved it secure in the random oracle model (ROM). Our protocol only requires each entity to compute one pairing, up to now, it turns out to be the most efficient one of all the previously known CL-KA schemes.
  • Keywords
    protocols; public key cryptography; set theory; bilinear pairing; certificate management; certificateless cryptography; identity based cryptography; key escrow problem; public key cryptography; random oracle model; two party certificateless key agreement protocol; Computer science; Cryptographic protocols; Data security; Identity management systems; Identity-based encryption; Information security; Public key; Public key cryptography; Read only memory; Resilience;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    e-Business and Information System Security (EBISS), 2010 2nd International Conference on
  • Conference_Location
    Wuhan
  • Print_ISBN
    978-1-4244-5893-6
  • Electronic_ISBN
    978-1-4244-5895-0
  • Type

    conf

  • DOI
    10.1109/EBISS.2010.5473707
  • Filename
    5473707