Universiti Teknologi Malaysia Institutional Repository

Secure pairing-free two-party certificateless authenticated key agreement protocol with minimal computational complexity

Ghoreishi, Seyedmohsen (2019) Secure pairing-free two-party certificateless authenticated key agreement protocol with minimal computational complexity. PhD thesis, Universiti Teknologi Malaysia.


Official URL: http://dms.library.utm.my:8080/vital/access/manage...


Key agreement protocols play a vital role in maintaining security in many critical applications due to the importance of the secret key. Bilinear pairing was commonly used in designing secure protocols for the last several years; however, high computational complexity of this operation has been the main obstacle towards its practicality. Therefore, implementation of Elliptic-curve based operations, instead of bilinear pairings, has become popular recently, and pairing-free key agreement protocols have been explored in many studies. A considerable amount of literatures has been published on pairing-free key agreement protocols in the context of Public Key Cryptography (PKC). Simpler key management and non-existence of key escrow problem make certificateless PKC more appealing in practice. However, achieving certificateless pairing-free two-party authenticated key agreement protocols (CL-AKA) that provide high level of security with low computational complexity, remains a challenge in the research area. This research presents a secure and lightweight pairingfree CL-AKA protocol named CL2AKA (CertificateLess 2-party Authenticated Key Agreement). The properties of CL2AKA protocol is that, it is computationally lightweight while communication overhead remains the same as existing protocols of related works. The results indicate that CL2AKA protocol is 21% computationally less complex than the most efficient pairing-free CL-AKA protocol (KKC-13) and 53% less in comparison with the pairing-free CL-AKA protocol with highest level of security guarantee (SWZ-13). Security of CL2AKA protocol is evaluated based on provable security evaluation method under the strong eCK model. It is also proven that the CL2AKA supports all of the security requirements which are necessary for authenticated key agreement protocols. Besides the CL2AKA as the main finding of this research work, there are six pairing-free CL-AKA protocols presented as CL2AKA basic version protocols, which were the outcomes of several attempts in designing the CL2AKA.

Item Type:Thesis (PhD)
Uncontrolled Keywords:key agreement protocols, Public Key Cryptography (PKC), elliptic-curve
Subjects:Q Science > QA Mathematics > QA75 Electronic computers. Computer science
ID Code:96184
Deposited By: Narimah Nawil
Deposited On:04 Jul 2022 16:21
Last Modified:04 Jul 2022 16:21

Repository Staff Only: item control page