A PERFORMANCE IMPROVED CERTIFICATELESS KEY AGREEMENT SCHEME OVER ELLIPTIC CURVE BASED ALGEBRAIC GROUPS
Keywords:Certificateless, key agreement, pairing-free, efficiency
AbstractDue to the importance of key in providing secure communication, various Key Agreement protocols have been proposed in the recent years. The latest generation of Public Key Cryptosystems (PKC) called Certificateless PKC played an important role in the transformation of Key Agreement protocols. In this scientific area, several Key Agreement protocols have been proposed based on Bilinear Pairings. However, pairing operation is known as an expensive cryptographic function. Hence, utilization of pairing operation in the mentioned works made them complex from overall computational cost perspective. In order to decrease the computational cost of Key Agreement protocols, several Certificateless Key Agreement protocols have been proposed by the use of operations over Elliptic Curve based Algebraic Groups instead of using Bilinear Pairings. In this paper, we propose a Pairing-free Certificateless two-party Key Agreement protocol. Our results indicate that our secure protocol is significantly more lightweight than existing related works.
Al-Riyami, S. S., Paterson, K. G. 2003. Certificateless Public Key Cryptography. C. S. Laih (ed.). Advances in Cryptology C Asiacrypt 2003. Lecture Notes in Computer Science. 452-473.
Zhang, Z., Wong, D. 2006. Certificateless Public-Key Signature: Security Model and Efficient Construction. In: Zhou, J., Yung, M., Bao, F. eds. Applied Cryptography and Network Security. Springer, Heidelberg. 293-308.
Li, X., Chen, K., Sun, L. 2005 Certificateless Signature and Proxy Signature Schemes from Bilinear Pairings. Lithuanian Mathematical Journal. 45: 76-83.
Liu, J. K., Au, M. H., Susilo, W. 2007. Self-Generated-Certificate Public Key Cryptography and Certificateless Signature/Encryption Scheme in the Standard Model. In: 2007 ACM Symposium on InformAtion, Computer and Communications Security-ASIACCSâ€™07.
Yum, D. H., Lee, P. J. 2004. Generic Construction of Certificateless Encryption. In: LaganÃ¡, A., Gavrilova, M. L., Kumar, V., Mun, Y., Tan, C. J. K., Gervasi, O. eds. Computational Science and Its Applicationsâ€“ICCSA 2004. Springer, Heidelberg. 802-811.
Wang, S. Cao, Z. Dong. X. 2006. Certificateless Authenticated Key Agreement Based On The MTI/CO Protocol. Journal of Information and Computational Science. 575-581.
Mandt, T., Tan. C. 2008. Certificateless Authenticated Two-Party Key Agreement Protocols. In: Proceedings of the ASIAN 2006, in: LNCS, vol. 4435. Springer-Verlag. 37-44.
Shi, Y., Li. J. 2007. Two-party Authenticated Key Agreement In Certificateless Public Key Cryptography. Wuhan University Journal of Natural Sciences. 12(1): 71-74.
Lippold, G., Boyd, C., Nieto, J. 2009. Strongly Secure Certificateless Key Agreement. In: Pairing 2009. 206-230.
Hou, M. Xu, Q., 2009. A Two-Party Certificateless Authenticated Key Agreement Protocol Without Pairing. In: 2nd IEEE International Conference on Computer Science and Information Technology. 412-416.
Baek, J., Safavi-Naini, R. and Susilo, W. 2005. Certificateless Public Key Encryption Without Pairing. In Proceedings of the 8th International Conference on Information Security. Volume 3650 of LNCS. Springer-Verlag. 134-148, doi: 10.1007/11556992.
Geng, M., Zhang, F. 2009. Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol Without Pairing. In: International Conference on Computational Intelligence and Security. 208-212.
Yang, G., Tan, C. 2011. Strongly Secure Certificateless Key Exchange Without Pairing. In: 6th ACM Symposium on Information, Computer and Communications Security. 71-79.
Ghoreishi, S. M., Abd Razak, S., Isnin, I. F., Chizari, H. 2014. New Secure Identity-Based and Certificateless Authenticated Key Agreement protocols without Pairings. In Proceedings of 2014 International Symposium on Biometrics and Security Technologies (ISBAST), Kuala Lumpur, MALAYSIA. 188-192.
Ghoreishi, S. M., Abd Razak, S., Isnin, I. F., Chizari, H. 2014. A Novel Secure Two-Party Identity-Based Authenticated Key Agreement Protocol Without Bilinear Pairings. In Proceedings of 4th World Congress on Information and Communication Technologies (WICT), Malacca, MALAYSIA. 251-258.
Ghoreishi, S. M., Abd Razak, S., Isnin, I. F., Chizari, H. 2014. An Efficient Pairing-free Certificateless Authenticated Two-party Key Agreement protocol over Elliptic Curves. In Proceedings of 4th World Congress on Information and Communication Technologies (WICT), Malacca, MALAYSIA. 259-266.
Ghoreishi, S. M., Abd Razak, S., Isnin, I. F., Chizari, H. 2015. Secure and Authenticated Key Agreement Protocol with Minimal Complexity of Operations in the Context of Identity-Based Cryptosystems. In Proceedings of 2015 International Conference on Computer, Communication, and Control Technology (I4CT), Kuching, Malaysia.
He, D. Padhye, S. Chen, J. 2012. An Efficient Certificateless Two-Party Authenticated Key Agreement Protocol, Computers & Mathematics with Applications. 64(6): 1914-1926.
Sun, H. Wen, Q. Zhang, H. Jin Z., 2013. A Novel Pairing-Free Certificateless Authenticated Key Agreement Protocol With Provable Security. Frontiers of Computer Science. Springer.
He, D. Chen, J. Hu, J. 2012. A Pairing-Free Certificateless Authenticated Key Agreement Protocol. International Journal of Communication Systems. 25(2): 221-230.
Chen, L. Cheng, Z. Smart, N. P. 2007. Identity-Based Key Agreement Protocols from Pairings. International Journal of Information Security. Springer.
Zhang, F., Safavi-Naini, R., Susilo. W., 2004. An Efficient Signature Scheme From Bilinear Pairings And Its Applications. In Proceedings of PKC 2004.
Cao, X., Kou, W., Du, X. 2010. A Pairing-Free Identity-Based Authenticated Key Agreement Protocol With Minimal Message Exchanges. Information Sciences. 180: 2895-2903.
Islam, S. H., Biswas, G. P. 2012. A Pairing-Free Identity-Based Authenticated Group Key Agreement Protocol For Imbalanced Mobile Networks. Ann. Telecommun. 67(11-12): 547-558.
How to Cite
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.