We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

An Improved Certificateless Authentication Key Agreement Protocol

by Renu Srivastava, A.k. Misra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 3
Year of Publication: 2013
Authors: Renu Srivastava, A.k. Misra
10.5120/11942-7736

Renu Srivastava, A.k. Misra . An Improved Certificateless Authentication Key Agreement Protocol. International Journal of Computer Applications. 70, 3 ( May 2013), 15-19. DOI=10.5120/11942-7736

@article{ 10.5120/11942-7736,
author = { Renu Srivastava, A.k. Misra },
title = { An Improved Certificateless Authentication Key Agreement Protocol },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 3 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number3/11942-7736/ },
doi = { 10.5120/11942-7736 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:31:53.435173+05:30
%A Renu Srivastava
%A A.k. Misra
%T An Improved Certificateless Authentication Key Agreement Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 3
%P 15-19
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

To overcome the key escrow issues of the identity based cryptography, Shi Yijuan and Ll Jianhua [11] proposed a new Certificateless Two-party Authentication Key Agreement (CL-2AKA) protocol. In this paper an improved CL-2AKA Protocol has been proposed. The proposed protocol CAKA (Certificateless Authentication Key Agreement Protocol) is based on the algebraic properties of the pairing. The proposed protocol attempts to mitigate the man-in-the middle and Key-compromise impersonation attacks. is found to be more efficient on computation and has more compact cipher text than the existing schemes.

References
  1. B. Libert and J. J. Quisquater, "On constructing certificateless cryptosystems from identity based encryption", Public Key Cryptography - PKC 2006, Springer Berlin/Heidelberg, Vol. 3958 of Lecture Notes in Computer Science, 2006, pp. 474-490, doi: 10. 1007/11745853_31.
  2. Chen L, Kudla C. , "Identity Based Authenticated Key Agreement from Pairings", 2004.
  3. Georg. L. , Colin. B, J. M. G. . Nieto, "Stronger Secure Certificateless Key Agreement pairing 2009", LNCS 5671,pp. 206-230,2009, Springer-Verlag Berlin Heidelberg 2009
  4. Joonsang Baek, et. al. "A Survey of Identity-Based Cryptography", 2004.
  5. Liu Wenhao, Xu Chuxiang, Xu Jian. , "Certificateless Two Party Key Agreement Protocol", IEEE-2010 International Conference on Multimedia Information Networking and Security, pp 520-525.
  6. Mandt, T. K. , "Certificateless Authenticated Two-Party Key Agreement Protocols", Master Thesis, University of Gjovik (2006).
  7. Mengbo Hou and Qiuliang Xu. , "Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol", IEEE-2009, Asia-Pacific Conference on Information Processing, pp 574-577.
  8. S. S. Al-Riyami and K. Paterson. , "Certificateless Public Key Cryptography", In C. S. Laih, editor, Advances in Cryptology - Asiacrypt 2003, volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer-Verlag, 2003.
  9. S. S. Al-Riyami and K. Paterson. , "CBE from CL-PKE: A Generic Construction and Efficient Schemes", In S. Vaudenay, editor, PKC 2005, volume 3386 of Lecture Notes in Computer Science, pages 398-415. Springer-Verlag, Berlin 2005.
  10. Shamir A. , "Identity-Based Cryptosystems and Signature Schemes", [j]. Lecture Notes in Computer Science,1994, 196: 47-53.
  11. Shi,Y. , Li,J. , "Two-Party Authenticated Key Agreement in Cerfiticateless Public Key Cryptography", Wuhan University Journal of Natural Sciences, 12(1),071-074 (2007).
  12. Swanson, C, Jao,D. , "A Study of Two-Party Certificateless Authenticated Key Agreement Protocols", INDOCRYPT 2009, LNCS 5922,pp. 57-71,2009, Springer-Verlag Berlin Heidelberg 2009, 53234.
  13. Swanson, C. M. , "Security in Key Agreement: Two-Party Certificateless Schemes", Masters Thesis, University of Waterloo (2009)
  14. Xia,L. , Wang,S. , Shen,J. , Xu,G. , "Breaking and repairing the certificateless key agreement protocol from ASIAN 2006", Wuhan University Journal of Natural Science 13(5), 562-566 (2008)
  15. Wang, S. , Coa, Z. , Wang L. , "Efficient Certificateless Authenticated Key Agreement Protocol form Pairing", Wuhan University Journal of Natural Sciences: 11(5), 1278- 1282 (2006).
  16. Zu-hua Shao. , "Efficient authenticated key agreement protocol using self-certified public keys from pairings", Wuhan University Journal of Natural Sciences 10(1),267- 270 (2005)
Index Terms

Computer Science
Information Sciences

Keywords

Information Security Cryptography