Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
On Fast and Provably Secure Message Authentication Based on Universal Hashing
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On the Risk of Disruption in Several Multiparty Signature Schemes
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptography and Network Security (4th Edition)
Cryptography and Network Security (4th Edition)
NCM '09 Proceedings of the 2009 Fifth International Joint Conference on INC, IMS and IDC
Provably secure non-interactive key distribution based on pairings
Discrete Applied Mathematics - Special issue: Coding and cryptography
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Certificateless authenticated two-party key agreement protocols
ASIAN'06 Proceedings of the 11th Asian computing science conference on Advances in computer science: secure software and related issues
Hi-index | 0.00 |
A key agreement scheme is an important technique to establish a common secret over an insecure communication environment such as the Internet. In this paper, we elaborate on the merits of self-certified public key systems and bilinear pairing cryptosystems to propose an efficient and secure non-interactive authenticated key agreement (NI-AKA) scheme. The security of our scheme is proved to be computationally equivalent to the bilinear Diffie-Hellman problem (BDHP). In addition, the proposed scheme has the following advantages: (i) Two participants can easily establish a shared secret key between them without further interactions, so as to greatly reduce the possibility of leaking any security information of the shared secret key. (ii) Combining with self-certified public key systems, the proposed scheme makes it unnecessary to verify each other's public key in advance, since the authenticity of the public keys is simultaneously validated when the mutually shared secret key is correctly established. (iii) Based on the bilinear pairing cryptosystems over elliptic curves, our scheme is suitable for mobile applications with limited computing power and insufficient storage space, such as PDAs and cellular phones, etc.