A Certificateless Noninteractive Key Exchange Protocol with Provable Security

被引:0
|
作者
Cao, Xuefei [1 ]
Dang, Lanjun [1 ]
Luan, Yingzi [2 ]
You, Wei [1 ]
机构
[1] Xidian Univ, Sch Cyber Engn, 2 South Taibai Rd, Xian 710071, Peoples R China
[2] Xidian Univ, Sch Telecommun Engn, 2 South Taibai Rd, Xian 710071, Peoples R China
基金
美国国家科学基金会;
关键词
Satellite communication systems;
D O I
10.1155/2020/8862476
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we propose a certificateless noninteractive key exchange protocol. No message exchange is required in the protocol, and this feature will facilitate the applications where the communication overhead matters, for example, the communications between the satellites and the earth. The public key certificate is removed as well as the key escrow problem using the certificateless public key cryptosystem. The security of the protocol rests on the bilinear Diffie-Hellman problem, and it could be proved in the random oracle model. Compared with previous protocols, the new protocol reduces the running time by at least 33.0%.
引用
收藏
页数:8
相关论文
共 50 条
  • [21] Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
    Akram, Waseem
    Mahmood, Khalid
    ul Haq, Hafiz Burhan
    Asif, Muhammad
    Chaudhry, Shehzad Ashraf
    Shon, Taeshik
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 263 - 280
  • [22] Certificateless Non-Interactive Key Exchange Protocol without Pairings
    Wei, Yun
    Wei, Fushan
    Ma, Chuangui
    2014 11TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT), 2014, : 31 - 42
  • [23] Certificateless Key Agreement Protocol
    Chen Yixiang
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 438 - 441
  • [24] Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security
    Zhang, Lei
    Wu, Qianhong
    Domingo-Ferrer, Josep
    Qin, Bo
    Zeng, Peng
    INFORMATION SCIENCES, 2014, 272 : 223 - 237
  • [25] certificateless partially-blind signature scheme with provable security
    Zhao Z.-G.
    1600, Univ. of Electronic Science and Technology of China (45): : 812 - 818
  • [26] Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud
    Liao, Yongjian
    Liang, Yikuan
    Oyewole, Adeniyi Wisdom
    Nie, Xuyun
    IEEE ACCESS, 2019, 7 : 93259 - 93263
  • [27] A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds
    Teng, Jikai
    Wu, Chuankun
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (01) : 104 - 110
  • [28] A Provable Secure Scheme Based on Certificateless Public Key Cryptography
    Wang, Yanhong
    Ye, Junyao
    Ye, Junyao
    3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION ENGINEERING (CSIE 2015), 2015, : 14 - 18
  • [29] An Efficient Password-Based Authenticated Key Exchange Protocol with Provable Security for Mobile Client-Client Networks
    Heydari, Mohammad
    Sadough, S. Mohammad Sajad
    Farash, Mohammad Sabzinejad
    Chaudhry, Shehzad Ashraf
    Mahmood, Khalid
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 88 (02) : 337 - 356
  • [30] Certificateless Provable Data Possession Scheme With Provable Security in the Standard Model Suitable for Cloud Storage
    Deng, Lunzhi
    Wang, Bo
    Wang, Tao
    Feng, Shuai
    Li, Siwei
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 3986 - 3998