Skip to main content
Article thumbnail
Location of Repository

Strongly Secure Certificateless Key Agreement

By Georg Lippold, Colin Boyd and Juan M. Gonzalez Nieto

Abstract

We introduce a formal model for certificateless authenticated key exchange (CL-AKE) protocols. Contrary to what might be expected, we show that the natural combination of an ID-based AKE protocol with a public key based AKE protocol cannot provide strong security. We provide the first one-round CL-AKE scheme proven secure in the random oracle model. \ud We introduce two variants of the Diffie-Hellman trapdoor the introduced by \cite{DBLP:conf/eurocrypt/CashKS08}.\ud The proposed key agreement scheme is secure as long as each party has at least one uncompromised secret. Thus, our scheme is secure even if the key generation centre learns the ephemeral secrets of both parties

Topics: 080402 Data Encryption, public key cryptography, key exchange, certificateless, key agreement, random oracle model, eCK, Bilinear Diffie-Hellman Trapdoor, proof
Publisher: Springer Berlin / Heidelberg
Year: 2009
DOI identifier: 10.1007/978-3-642-03298-1_14
OAI identifier: oai:eprints.qut.edu.au:27426

Suggested articles

Citations

  1. (2003). Certi Public Key Cryptography.
  2. (2003). Identity based encryption from the Weil pairing.
  3. (2008). Generic Constructions of Identity-Based and Certi KEMs.
  4. (2007). Identity-based key agreement protocols from pairings.
  5. (2008). The Twin Die-Hellman Problem and Applications.
  6. (2002). Practical non-interactive key distribution based on pairings. Cryptology ePrint Archive,
  7. (2008). A survey of certi encryption schemes and security models.
  8. (2008). Certi encryption schemes strongly secure in the standard model.
  9. (2008). An ID-based Authenticated Key Exchange Protocol Based on Bilinear Die-Hellman Problem. Cryptology ePrint Archive, Report 2008/224,
  10. (2005). HMQV: A High-Performance Secure Die-Hellman Protocol. Cryptology ePrint Archive,
  11. (1997). A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup.
  12. (2007). Stronger Security of Authenticated Key Exchange.
  13. (2003). An Ecient Protocol for Authenticated Key Agreement.
  14. (2006). On Constructing Certi Cryptosystems from Identity Based Encryption. In Moti Yung, Yevgeniy Dodis, Aggelos Kiayias,
  15. Mandt and Chik How Tan. Certi Authenticated Two-Party Key Agreement Protocols.

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.