Font Size: a A A

Research On Certificateless Authenticated Key Agreement Protocol

Posted on:2015-02-03Degree:MasterType:Thesis
Country:ChinaCandidate:G Y LiFull Text:PDF
GTID:2268330431954437Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Information security relationship with the prosperity and development of the Internet. With the rapid development of the network, information security disclosure of personal privacy and cyber crime increasingly attracted widespread attention. Authenticated key agreement protocol (AK) is used to achieve security and authentication information between the parties involved in interactive communication in the public network environment. Currently, AK protocol in e-commerce, web collaboration, security, e-government programs, and other applications to build playing an increasingly important. Certificateless authentication key agreement protocol (CL-AK) not only avoids the overhead of the certificate but also eliminates the key escrow problem. With the development of the network, certificateless authentication key agreement protocol is now increasingly used in various communication fields. However, after certificateless public key cryptosystem proposed for certificateless authentication key agreement protocol study is relatively small, especially for the formal proof of the certificateless authentication key agreement protocol. So it has a good theoretical value and a good application value of the research in this field. In this article, we will study and analyze certificateless authenticated key agreement protocol.Since Lippold made a strong safety certificateless key agreement protocol, many other strong security key agreement scheme is successively raised (such as protocol [3], protocol [4]). However, the majority of which lower the efficiency or lack of agreement in the proof of the security model. Designing a certificateless authentication key agreement protocol and proving it security under correct difficulty assumption and appropriate security model is so important that we need further study in this field.In this article, we will analysis and summarize many classic existing CL-AK protocol, and propose a new CL-AK protocol on this basis. Compared with other strong security certificateless authentication key agreement protocol, the new protocol reduced computational complexity, and can be proven secure in the random oracle model. The new CL-AK protocol proposed to meet all the necessary security properties, such as forward security, known key security, key leak simulation, unknown key security. As long as both participants have at least one secret that has not been leaked, the agreements can be safely executed. In addition, compared with other strong security key agreement protocol (such as Lippold [2], protocol [3], protocol [4])the new agreement has a higher efficiency.
Keywords/Search Tags:Certificateless, key agreement, authentication, provable security, randomoracle model, bilinear pairing
PDF Full Text Request
Related items