Certificateless Two Party Key Agreement Protocol
Certificateless cryptography aims at combining the advantages of identity based and public key cryptography in order to avoid the key escrow problem inherent in the identity based cryptography and cumbersome certificate management in the traditional public key infrastructure. The provably secure certificateless key agreement protocol is proposed by Lippold et al. in 2009, but their protocol suffers from computation burden. Owing to the above-mentioned situations, a new certificateless two party key agreement protocol (CL-KA) is proposed and the security attributes are analyzed in the extended Canetti-Krawzcyk(eCK) security model. Our protocol only requires each entity to compute two pairings, up to now, it turns out to be the most efficient one of all the previously known security CL-KA schemes.
certificateless key agreement two party eCK security model
Liu Wenhao Xu Chunxiang Xu Jian
School of Computer Science & Engineering, University of Electronic Science & Technology of China, Ch School of International Trade and Economics, University of Jiangxin Financial Economics, Nanchang 33
国际会议
南京
英文
520-525
2010-11-01(万方平台首次上网日期,不代表论文的发表时间)