Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols

Saikrishna Badrinarayanan, C. Pandu Rangan

Abstract

Designing efficient key agreement protocols is a fundamental cryptographic problem. In this paper, we first define a security model for key agreement in certificateless cryptography that is an extension of earlier models. We note that the existing pairing free protocols are not secure in our model. We design an efficient pairing-free, single round protocol that is secure in our model based on the hardness assumption of the Computational Diffie Hellman (CDH) problem. We also observe that previously existing pairing-free protocols were secure based on much stronger assumptions such as the hardness of the Gap Diffie Hellman problem. We use a restriction of our scheme to design an efficient pairing-free single round identity based key agreement protocol that is secure in the id-CK+ model based on the hardness assumption of the CDH problem. Additionally, both our schemes satisfy several other security properties such as forward secrecy, resistance to reflection attacks etc.

References

  1. Canetti, R. and Krawczyk, H. (2001). Analysis of keyexchange protocols and their use for building secure channels. In Advances in CryptologyEUROCRYPT 2001, pages 453-474. Springer.
  2. Cao, X., Kou, W., and Du, X. (2010). A pairingfree identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci., 180(15):2895-2903.
  3. Cremers, C. (2011). Examining indistinguishability-based security models for key exchange protocols: the case of ck, ck-hmqv, and eck. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 80-91. ACM.
  4. Fiore, D. and Gennaro, R. (2010). Making the diffiehellman protocol identity-based. In Topics in Cryptology-CT-RSA 2010, pages 165-178. Springer.
  5. Fujioka, A., Suzuki, K., Xagawa, K., and Yoneyama, K. (2012). Strongly secure authenticated key exchange from factoring, codes, and lattices. In Public Key Cryptography-PKC 2012, pages 467-484. Springer.
  6. Geng, M. and Zhang, F. (2009). Provably secure certificateless two-party authenticated key agreement protocol without pairing. In Computational Intelligence and Security, 2009. CIS'09. International Conference on, volume 2, pages 208-212. IEEE.
  7. G√ľnther, C. G. (1990). An identity-based key-exchange protocol. In Advances in CryptologyEurocrypt89, pages 29-37. Springer.
  8. He, D., Padhye, S., and Chen, J. (2012). An efficient certificateless two-party authenticated key agreement protocol. Computers & Mathematics with Applications, 64(6):1914-1926.
  9. Islam, S. and Biswas, G. (2012). An improved pairing-free identity-based authenticated key agreement protocol based on ecc. Procedia Engineering, 30:499-507.
  10. Krawczyk, H. (2005). Hmqv: A high-performance secure diffie-hellman protocol. In Advances in CryptologyCRYPTO 2005, pages 546-566. Springer.
  11. LaMacchia, B., Lauter, K., and Mityagin, A. (2007). Stronger security of authenticated key exchange. In Provable Security, pages 1-16. Springer.
  12. Lippold, G., Boyd, C., and Nieto, J. G. (2009). Strongly secure certificateless key agreement. In PairingBased Cryptography-Pairing 2009, pages 206-230. Springer.
  13. Lippold, G. and Nieto, J. G. (2010). Certificateless key agreement in the standard model. In Proceedings of the Eighth Australasian Conference on Information Security-Volume 105, pages 75-85. Australian Computer Society, Inc.
  14. Saeednia, S. (2000). Improvement of gunther's identitybased key exchange protocol. Electronics Letters, 36(18):1535-1536.
  15. Sun, H., Wen, Q., Zhang, H., and Jin, Z. (2013). A novel pairing-free certificateless authenticated key agreement protocol with provable security. Frontiers of Computer Science, 7(4):544-557.
  16. Swanson, C. and Jao, D. (2009). A study of two-party certificateless authenticated key-agreement protocols. In Progress in Cryptology-INDOCRYPT 2009, pages 57-71. Springer.
  17. Vivek, S. S., Selvi, S. S. D., Venkatesan, L. R., and Rangan, C. P. (2013). Efficient, pairing-free, authenticated identity based key agreement in a single round. In Provable Security, pages 38-58. Springer.
  18. Yang, G. and Tan, C.-H. (2011). Strongly secure certificateless key exchange without pairing. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pages 71-79. ACM.
Download


Paper Citation


in Harvard Style

Badrinarayanan S. and Pandu Rangan C. (2014). Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 67-78. DOI: 10.5220/0005043400670078


in Bibtex Style

@conference{secrypt14,
author={Saikrishna Badrinarayanan and C. Pandu Rangan},
title={Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={67-78},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005043400670078},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - Pairing-free Single Round Certificateless and Identity Based Authenticated Key Exchange Protocols
SN - 978-989-758-045-1
AU - Badrinarayanan S.
AU - Pandu Rangan C.
PY - 2014
SP - 67
EP - 78
DO - 10.5220/0005043400670078