Journal of CommunicationsVol. 37, Issue 7, Pages: 161-171(2016)
作者机构:
北京航空航天大学电子信息工程学院,北京 100191
作者简介:
基金信息:
The National Basic Research Program of China (973 Program)(2012CB315905);The National Natural Science Foundation of China(61272501);The Fundamental Research Funds for the Central Universities(YWF-15-GJSYS-059)
A hierarchical certificateless authenticated key agreement protocol was proposed
and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model
the security of the protocol was based on the computa-tional Diffie-Hellman assumption. In the protocol
a root PKG authenticates the identity and generates a partial private key for lower-level PKG which authenticate the identity and generate a partial private key for users
private key generated by partial private key and user selected secret value. Comparing with the existing protocols
the protocol is efficient without bilinear pairings computation.
关键词
Keywords
references
HUNT R . PKI and digital certification infrastructure [C ] // Ninth IEEE International Conference on Networks .IEEE, c 2001 : 234 - 239 .
SHAMIR A . Identity based cryptosystems and signature schemes [C ] // Advances in Cryptology Crypto84 .Berlin:Springer-Verlag, c 1984 : 47 - 53 .
AL-RIYAMI S S , PATERSON K G . Certificateless public key cryp-tography [M ] . Advances in Cryptology-ASIACRYPT 2003 ,Springer Berlin Heidelberg, 2003 : 452 - 473 .
HE D , CHEN Y , CHEN J , et al . A new two-round certificateless au-thenticated key agreement protocol without bilinear pairings [J ] . Mathematical and Computer Modelling , 2011 , 54 ( 11 ): 3143 - 3152 .
HE D , CHEN J , HU J . A pairing‐free certificateless authenticated key agreement protocol [J ] . International Journal of Communication Systems , 2012 , 25 ( 2 ): 221 - 230 .
HE D , PADHYE S , CHEN J . An efficient certificateless two-party authenticated key agreement protocol [J ] . Computers & Mathematics with Applications , 2012 , 64 ( 6 ): 1914 - 1926 .
TONG D , LIU J W , MAO K F , et al . Certificateless and pairing-free key agreement scheme for satellite network C ] // Communications Security Conference (CSC 2014) .IET, c 2014 : 1 - 5 .
MOHAMED N A F , HASHIM M H A , BASHIER E , et al . Fully-secure and efficient pairing-free certificateless authenticated key agreement protocol C ] // 2012 World Congress on Internet Security (WorldCIS) ,IEEE, c 2012 : 167 - 172 .
SUN H Y , WEN Q Y , ZHANG H , et al . A strongly secure pairing-free certificateless authenticated key agreement protocol for low-power devices [J ] . Information Technology and Control , 2013 , 42 ( 2 ): 191 - 204 .
GHOREISHI S M , ABD R S , ISNIN I F , et al . New secure iden-tity-based and certificateless authenticated key agreement protocols without pairings C ] // 2014 International Symposium on Biometrics and Security Technologies (ISBAST) .IEEE, c 2014 : 188 - 192 .
WANG Z , DU X , SUN Y . Group key management scheme based on proxy re-cryptography for near-space network C ] // 2011 International Conference on Network Computing and Information Security (NCIS) .IEEE, c 2011 , 1 : 52 - 56 .
GENTRY C , SILVERBERG A . Hierarchical ID-based cryptography [M ] . Advances in cryptology—ASIACRYPT2002 ,Springer Berlin Heidelberg, 2002 : 548 - 566 .
CAO C L , LIU M Q , ZHANG R , et al . Provably secure authenticated key agreement protocol based on hierarchical identity [J ] . Journal of Electronics & Information Technology , 2014 , 36 ( 12 ): 2848 - 2854 .
LIU W , LIU J , WU Q , et al . SAKE: scalable authenticated key ex-change for mobile e‐health networks [J/OL ] . Security and Communication Networks , http://onlinelibrary.wiley.com/doi/10.1002/sec.1198/epdf http://onlinelibrary.wiley.com/doi/10.1002/sec.1198/epdf .
CHOW S S M , ROTH V , RIEFFEL E G . General certificateless en-cryption and timed-release encryption [M ] . Security and Cryptography for Networks ,Springer Berlin Heidelberg, 2008 : 126 - 143 .
HANKERSON D , VANSTONE S , MENEZES A J . Guide to elliptic curve cryptography [M ] . Springer Science & Business Media , 2004 .
LIPPOLD G , BOYD C , NIETO J G . Strongly secure certificateless key agreement [M ] . Pairing-Based Cryptography-Pairing 2009 ,Springer Berlin Heidelberg, 2009 : 206 - 230 ..