(ProSe) (Rel. 12). Technical Report (TR) 22.803, 3rd
Generation Partnership Project (3GPP). V1 2.2.0.
Al-Riyami, S. S. and Paterson, K. G. (2003). Certificateless
public key cryptography. In Advances in Cryptology
- ASIACRYPT 2003, 9th International Conference on
the Theory and Application of Cryptology and Infor-
mation Security, Taipei, Taiwan, November 30 - De-
cember 4, 2003, Proceedings, pages 452–473.
Alkubaisy, D. (2017). A framework managing conflicts
between security and privacy requirements. In 11th
International Conference on Research Challenges in
Information Science, RCIS 2017, Brighton, United
Kingdom, May 10-12, 2017, pages 427–432.
Au, M. H., Mu, Y., Chen, J., Wong, D. S., Liu, J. K., and
Yang, G. (2007). Malicious kgc attacks in certificate-
less cryptography. In Proceedings of the 2Nd ACM
Symposium on Information, Computer and Communi-
cations Security, ASIACCS ’07, pages 302–311, New
York, NY, USA. ACM.
Barreto, P. S. L. M., Kim, H. Y., Lynn, B., and Scott, M.
(2002a). Efficient algorithms for pairing-based cryp-
tosystems. IACR Cryptology ePrint Archive, 2002:8.
Barreto, P. S. L. M., Lynn, B., and Scott, M. (2002b). Con-
structing elliptic curves with prescribed embedding
degrees. In Security in Communication Networks,
Third International Conference, SCN 2002, Amalfi,
Italy, September 11-13, 2002. Revised Papers, pages
257–267.
Cheon, J. H. and Lee, D. H. (2002). Diffie-hellman prob-
lems and bilinear maps. IACR Cryptology ePrint
Archive, 2002:117.
Ferrag, M. A., Maglaras, L., and Ahmim, A. (2017).
Privacy-preserving schemes for ad hoc social net-
works: A survey. IEEE Communications Surveys Tu-
torials, 19(4):3015–3045.
Frey, G., M
¨
uller, M., and R
¨
uck, H. (1999). The tate
pairing and the discrete logarithm applied to elliptic
curve cryptosystems. IEEE Trans. Information The-
ory, 45(5):1717–1719.
Galbraith, S. D., Harrison, K., and Soldera, D. (2002). Im-
plementing the tate pairing. In Algorithmic Number
Theory, 5th International Symposium, ANTS-V, Syd-
ney, Australia, July 7-12, 2002, Proceedings, pages
324–337.
Haus, M., Waqas, M., Ding, A. Y., Li, Y., Tarkoma, S.,
and Ott, J. (2017). Security and privacy in device-to-
device (d2d) communication: A review. IEEE Com-
munications Surveys Tutorials, 19(2):1054–1079.
Hsu, R., Lee, J., Quek, T. Q. S., and Chen, J. (2018). Graad:
Group anonymous and accountable d2d communica-
tion in mobile networks. IEEE Transactions on Infor-
mation Forensics and Security, 13(2):449–464.
Huang, X., Susilo, W., Mu, Y., and Zhang, F. (2005). On
the security of certificateless signature schemes from
asiacrypt 2003. In Cryptology and Network Security,
4th International Conference, CANS 2005, Xiamen,
China, December 14-16, 2005, Proceedings, pages
13–25.
Lang, S. (1987). Elliptic Functions, volume 12. Springer,
New York, NY.
Li, X., Zhang, Y., and Zhang, G. (2013). A new certifi-
cateless authenticated key agreement protocol for SIP
with different kgcs. Security and Communication Net-
works, 6(5):631–643.
Nait Hamoud, O., Kenaza, T., and Challal, Y. (2018a). Se-
curity in device-to-device communications: a survey.
IET Networks, 7(1):14–22.
Nait Hamoud, O., Kenaza, T., and Challal, Y. (2018b).
Towards using multiple KGC for CL-PKC to secure
D2D communications. In 2018 International Confer-
ence on Smart Communications in Network Technolo-
gies (SaCoNeT), pages 283–287.
Paja, E., Dalpiaz, F., and Giorgini, P. (2013). Managing
security requirements conflicts in socio-technical sys-
tems. In Conceptual Modeling - 32th International
Conference, ER 2013, Hong-Kong, China, November
11-13, 2013. Proceedings, pages 270–283.
Shamir, A. (1984). Identity-based cryptosystems and signa-
ture schemes. In Advances in Cryptology, Proceedings
of CRYPTO ’84, Santa Barbara, California, USA, Au-
gust 19-22, 1984, Proceedings, pages 47–53.
Sun, J., Zhang, C., Zhang, Y., and Fang, Y. (2011). Sat: A
security architecture achieving anonymity and trace-
ability in wireless mesh networks. IEEE Transactions
on Dependable and Secure Computing, 8(2):295–307.
Tehrani, M. N., Uysal, M., and Yanikomeroglu, H. (2014).
Device-to-device communication in 5g cellular net-
works: challenges, solutions, and future directions.
IEEE Communications Magazine, 52(5):86–92.
Wang, M. and Yan, Z. (2015). Security in d2d com-
munications: A review. In 2015 IEEE Trust-
com/BigDataSE/ISPA, volume 1, pages 1199–1204.
Zhang, A., Wang, L., Ye, X., and Lin, X. (2017).
Light-weight and robust security-aware d2d-assist
data transmission protocol for mobile-health sys-
tems. IEEE Trans. Information Forensics and Secu-
rity, 12(3):662–675.
Zhao, C., Yang, S., Yang, X., and McCann, J. A. (2017).
Rapid, user-transparent, and trustworthy device pair-
ing for d2d-enabled mobile crowdsourcing. IEEE
Trans. Mob. Comput., 16(7):2008–2022.
Zhou, C. (2018). Comments on “light-weight and robust
security-aware d2d-assist data transmission protocol
for mobile-health systems”. IEEE Transactions on In-
formation Forensics and Security, 13(7):1869–1870.
A New Certificateless System Construction for Multiple Key Generator Centers to Secure Device-to-Device Communications
95