Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Random oracles are practical: a paradigm for designing efficient protocols
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Identity-based key agreement protocols from pairings
International Journal of Information Security
An ID-based authenticated key exchange protocol based on bilinear Diffie-Hellman problem
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Strongly Secure Certificateless Key Agreement
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Simulatable certificateless two-party authenticated key agreement protocol
Information Sciences: an International Journal
Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing
CIS '09 Proceedings of the 2009 International Conference on Computational Intelligence and Security - Volume 02
Stronger security of authenticated key exchange
ProvSec'07 Proceedings of the 1st international conference on Provable security
Certificateless authenticated two-party key agreement protocols
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
A new provably secure certificateless short signature scheme
Computers & Mathematics with Applications
Strongly secure certificateless key exchange without pairing
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A pairing-free certificateless authenticated key agreement protocol
International Journal of Communication Systems
Lattice-based message recovery signature schemes
International Journal of Electronic Security and Digital Forensics
Hi-index | 0.09 |
Since certificateless public key cryptography (CLPKC) has received widespread attention due to its efficiency in avoiding key escrow problems in identity-based public key cryptography (ID-PKC), the certificateless authenticated key agreement (CLAKA) protocol, an important part of CLPKC, has been studied a great deal. Most CLAKA protocols are built from pairings which need costly operations. To improve the performance, several pairing-free CLAKA protocols have been proposed. In this paper, we propose a new pairing-free CLAKA protocol. Compared with the related protocols, our protocol has better performance. Also, our protocol is provably secure in a very strong security model-the extended Canetti-Krawczyk (eCK) model.