DocumentCode
2487136
Title
Certificateless Key Agreement Protocol
Author
Chen Yixiang
Author_Institution
Sch. of Comput. Sci., Hubei Univ. of Technol., Wuhan, China
fYear
2010
fDate
22-23 May 2010
Firstpage
1
Lastpage
4
Abstract
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure. A new two party certificateless key agreement protocol (CL-KA) is proposed and we proved it secure in the random oracle model (ROM). Our protocol only requires each entity to compute one pairing, up to now, it turns out to be the most efficient one of all the previously known CL-KA schemes.
Keywords
protocols; public key cryptography; set theory; bilinear pairing; certificate management; certificateless cryptography; identity based cryptography; key escrow problem; public key cryptography; random oracle model; two party certificateless key agreement protocol; Computer science; Cryptographic protocols; Data security; Identity management systems; Identity-based encryption; Information security; Public key; Public key cryptography; Read only memory; Resilience;
fLanguage
English
Publisher
ieee
Conference_Titel
e-Business and Information System Security (EBISS), 2010 2nd International Conference on
Conference_Location
Wuhan
Print_ISBN
978-1-4244-5893-6
Electronic_ISBN
978-1-4244-5895-0
Type
conf
DOI
10.1109/EBISS.2010.5473707
Filename
5473707
Link To Document