Provably secure certificateless trusted access protocol for WLAN without pairing

被引:0
作者
Ma, Zhuo [1 ]
Zhang, Junwei [1 ]
Ma, Jianfeng [1 ]
Ji, Wenjiang [1 ]
机构
[1] School of Computer Science and Technology, Xidian University
来源
Jisuanji Yanjiu yu Fazhan/Computer Research and Development | 2014年 / 51卷 / 02期
关键词
Authentication protocol; Certificateless public key cryptography; eCK (extended Canetti-Krawczyk) model; Trusted network connect; WLAN;
D O I
10.7544/issn1000-1239.2014.20120558
中图分类号
学科分类号
摘要
A pairing-free certificateless trusted access protocol for WLAN is proposed based on the certificateless public key cryptography and the trusted computing technologies. This protocol does not require the use of certificates and yet does not have the inherent key escrow feature of identity-based public key cryptography (ID-PKC). Taking the efficiency of this protocol into consideration, the following strategies are adopted in our protocol design. The platform authentication and integrity verification of station (STA) to authentication server (AS) are achieved during the authentication procedure. In addition, the explicit key agreement between STA and access point (AP) is adopted without 4-way handshake. Therefore, the mutual authentication and unicast session key agreement between STA and AP as well as the platform trusted verification are realized within 3 protocol rounds. In particular, the point multiplication on the elliptic curve is used instead of bilinear which causes significant computation overhead in the traditional certificateless public key cryptography. The security properties of the new protocol are examined using a very strong security model-the extended Canetti-Krawczyk (eCK) model, and the results show that the protocol is secure on the assumption that the Gap Diffie-Hellman problem is a difficult problem. The analytic comparisons show that the new protocol is very efficient in both computing and communication costs.
引用
收藏
页码:325 / 333
页数:8
相关论文
共 22 条
  • [1] Medium access control (MAC) security enhancements, amendment 6 to IEEE standard for information technology - Telecommunications and information exchange between systems-local and metropolitan area networks-specific requirements - Part 11: Wireless medium access control, (2004)
  • [2] He C., Mukund S., Datta A., Et al., A modular correctness proof of IEEE 802.11i and TLS, Proc of the 12th ACM Conf on Computer and Communications Security (CCS'05), pp. 2-15, (2005)
  • [3] Housley R., Polk W., Ford W., Et al., Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile, (2002)
  • [4] Shamir A., Identity-based cryptosystems and signature schemes, LNCS 196: Proc of the Advances in Cryptology-CRYPTO'84, pp. 47-53, (1985)
  • [5] Al-Riyami S.S., Paterson K., Certificateless public key cryptography, LNCS 2894: Proc of the Advances in Cryptology-ASIACRYPT'03, pp. 452-473, (2003)
  • [6] Lippold G., Boyd C., Nieto J., Strongly secure certificateless key agreement, LNCS 5671: Proc of the Pairing'09, pp. 206-230, (2009)
  • [7] Zhang L., Zhang F., Wu Q., Et al., Simulatable certifi-cateless two-party authenticated key agreement protocol, Information Sciences, 180, 2, pp. 1020-1030, (2010)
  • [8] Bentahar K., Farshim P., Malone-Lee J., Et al., Generic constructions of identity-based and certificateless KEMs, Journal of Cryptology, 21, 2, pp. 178-199, (2008)
  • [9] Dent A.W., A survey of certificateless encryption schemes and security models, International Journal of Information Security, 7, 5, pp. 349-377, (2008)
  • [10] Yang G., Tan C.-H., Strongly secure certificateless key exchange without pairing, Proc of the 6th ACM Symp on Information, Computer and Communications Security (AISACCS'11), pp. 71-79, (2011)