Title: Efficient two-party certificateless authenticated key agreement protocol under GDH assumption

Authors: Yong Xie; Libing Wu; Jian Shen; Li Li

Addresses: School of Information and Engineer, Jingdezhen Ceramic Institute, Jingdezhen, Jiangxi Province, China ' School of Computer, Wuhan University, Wuhan 430072, Hubei Province, China ' School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, Jiangshu Province, China ' International School of Software, Wuhan University, Wuhan, Hubei Province, China

Abstract: Security and efficiency are two key requirements for most of the authentication protocol, especially for the mobile wireless network. However, security and efficiency are a contradiction for the design of authentication protocol, it is hard to meet the two requirements simultaneously. Since certificateless public key cryptography (CL-PKC) has an advantage in wiping off key escrow problem, many certificateless authentication key agreement (CL_AKA) protocols have been proposed. The existing CL_AKA protocols may meet either security requirement well or efficiency requirement well, but cannot meet the two well. In this paper, we propose an efficient two-party CL_AKA protocol with strong security. We perform an in-depth security analysis in extended Canetti-Krawczyk (eCK) model to show the proposed CL_AKA protocol is provably secure. The performance analysis shows that the proposed protocol can meet the strong security and efficiency requirements simultaneously.

Keywords: AKA; authentication key agreement; CL-PKC; certificateless authentication key agreement; pairing-free; GDH; gap Diffie-Hellman assumption; eCK model.

DOI: 10.1504/IJAHUC.2019.097093

International Journal of Ad Hoc and Ubiquitous Computing, 2019 Vol.30 No.1, pp.11 - 25

Received: 22 Apr 2016
Accepted: 23 Oct 2016

Published online: 19 Dec 2018 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article