2017
DOI: 10.5755/j01.itc.46.3.14968
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing

Abstract: An authenticated key agreement (AKA) protocol is extremely essential to secure communications over insecure public networks. It enables the communication parties to securely set up a shared session key in present of the malicious attackers. Certificate-based cryptography (CBC) is a novel public-key cryptographic primitive that has many attractive merits. It solves the certificate revocation problem in conventional public-key cryptography and the key-escrow problem in identity-based cryptography. Until now, fou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…Moreover, Lim et al [3] proposed a new CB-AKE protocol to improve the security. Latterly, many studies on CB-AKE protocols were published in the literatures [4], [5], [6].…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, Lim et al [3] proposed a new CB-AKE protocol to improve the security. Latterly, many studies on CB-AKE protocols were published in the literatures [4], [5], [6].…”
Section: A Related Workmentioning
confidence: 99%
“…They may employ the CSK to encrypt data and transmit the encrypted data to the other participant to ensure the confidentiality of the data. Until now, several CB-AKE protocols [3], [4], [5], [6] have been proposed. However, none of these protocols can resist side channel attacks [7], [8].…”
Section: Introductionmentioning
confidence: 99%
“…According to the comparison result, there is a threat of user key leakage and KCI attack caused by leaked temporary key in the literature [2,7]. Once the attacker steals any user's temporary private key, he can calculate user's private key by the correlation expression and implement KCI attacks.…”
Section: Security and Efficiency Comparisonmentioning
confidence: 99%
“…But most of these protocols are based on bilinear pairs operation and the computational complexity is higher. Wenhao Liu et al [2] proposed a certificate-less two-party key agreement scheme without bilinear pairing and claimed that the scheme has a temporary key leak security. However, the analysis indicates that if the user's temporary key leaks, the user's master key expression ( + ) during the key agreement will be calculated.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation