Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
Identity-based key agreement protocols from pairings
International Journal of Information Security
Certificateless undeniable signature scheme
Information Sciences: an International Journal
Breaking the short certificateless signature scheme
Information Sciences: an International Journal
Multi-source Color Transfer Based on Multi-labeled Decision Tree
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
A new certificateless aggregate signature scheme
Computer Communications
Design of DL-based certificateless digital signatures
Journal of Systems and Software
Certificateless Threshold Ring Signature
Information Sciences: an International Journal
Authenticated key exchange secure against dictionary attacks
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Certificateless signature revisited
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Certificateless authenticated two-party key agreement protocols
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Modular security proofs for key agreement protocols
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
New directions in cryptography
IEEE Transactions on Information Theory
Certificateless threshold signature scheme from bilinear maps
Information Sciences: an International Journal
Fair E-payment protocol based on certificateless signature and authenticated key exchange
ICICA'10 Proceedings of the First international conference on Information computing and applications
Strongly secure certificateless key exchange without pairing
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Strongly secure identity-based authenticated key agreement protocols
Computers and Electrical Engineering
Provably secure one-round identity-based authenticated asymmetric group key agreement protocol
Information Sciences: an International Journal
Computer Networks: The International Journal of Computer and Telecommunications Networking
Provably-secure electronic cash based on certificateless partially-blind signatures
Electronic Commerce Research and Applications
Toward pairing-free certificateless authenticated key exchanges
ISC'11 Proceedings of the 14th international conference on Information security
A pairing-free certificateless authenticated key agreement protocol
International Journal of Communication Systems
Information Sciences: an International Journal
Provably secure threshold public-key encryption with adaptive security and short ciphertexts
Information Sciences: an International Journal
An efficient certificateless two-party authenticated key agreement protocol
Computers & Mathematics with Applications
On security of a certificateless signcryption scheme
Information Sciences: an International Journal
Provably secure certificateless one-way and two-party authenticated key agreement protocol
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.07 |
Key agreement (KA) allows two or more users to negotiate a secret session key among them over an open network. Authenticated key agreement (AKA) is a KA protocol enhanced to prevent active attacks. AKA can be achieved using a public-key infrastructure (PKI) or identity-based cryptography. However, the former suffers from a heavy certificate management burden while the latter is subject to the so-called key escrow problem. Recently, certificateless cryptography was introduced to mitigate these limitations. In this paper, we first propose a security model for AKA protocols using certificateless cryptography. Following this model, we then propose a simulatable certificateless two-party AKA protocol. Security is proven under the standard computational Diffie-Hellman (CDH) and bilinear Diffie-Hellman (BDH) assumptions. Our protocol is efficient and practical, because it requires only one pairing operation and five multiplications by each party.