A Taxonomy and Comparison of Two-Party Key Agreement Protocols
2016, International Journal of Research in Engineering and Technology
https://doi.org/10.15623/IJRET.2016.0517015Abstract
Key Management in symmetric cryptography is to securely share a secret key between the two communicating individuals. The popular solution to this key management issue is to use public key cryptography schemes. The key management techniques are broadly classified into Key Distribution protocols and Key Agreement protocols. This paper presents the detailed classification of Key Agreement protocols and provides some of the existing ECC based protocols in each category. Recently much work has been carried out in Identity Based Cryptography IBC, Certificateless Public Key Cryptography CLPKC and Pairing Based Cryptography PBC based techniques for key agreement. This paper also presents the comparison of two-party key agreement protocols under these areas based on the computational cost calculated in the key agreement phase.
References (38)
- Johann Van Der Merwe, Dawoud Dawoud, Stephen McDonald, "A Survey on Peer-to-Peer Key Management for Mobile Ad Hoc Networks," ACM Computing Surveys, Vol. 39, No. 1, Article 1, April 2007.
- Debiao He, Sahadeo Padhye, Jianhua Chen, "An efficient certificateless two-party authenticated key agreement protocol," Computers and Mathematics with Applications, 64 (2012), pp.1914-1926, Elsevier 2012.
- SK Hafizul Islam, G. P. Biswas, "An improved pairing- free identity-based authenticated key agreement protocol based on ECC," International Conference on Communication Technology and System Design 2011, pp. 499 -507, Elsevier 2011
- Quan Yuan, Songping Li, "A New Efficient ID-Based Authenticated Key Agreement Protocol," IACR Cryptology ePrint Archive, 2005.
- Manman Geng, Futai Zhang, "Provably Secure Certificateless Two-Party Authenticated Key Agreement Protocol without Pairing," International Conference on Computational Intelligence and Security, pp. 208-212, IEEE 2009.
- He Debiao, Chen Jianhua, Hu Jin, "A Pairing-free Certificateless Authenticated Key Agreement Protocol," International Journal of Communication Systems 25(2), pp. 221-230, 2012.
- D. He, Y. Chen, J. Chen, R.Zhang, W. Han, "A new two-round certificateless authenticated key agreement protocol without bilinear pairings," Mathematical and Computer Modeling, Vol. 54 pp. 3143-3152, 2011.
- G. Yang, C.Tan, "Strongly Secure certificateless key exchange without pairing," 6th ACM Symposium on Information, Computer and Communications Security, pp. 71-79, 2011.
- Mengbo Hou, Qiuliang Xu, "A Two-Party Certificateless Authenticated Key Agreement Protocol without Pairing," International Conference on Computer Science and Information Technology, pp. 412-416, IEEE 2009.
- Amr Farouk, Ali Miri, Mohamed M. Fouad, Ahmed A. Abdelhafez, "Efficient Pairing-Free, Certificateless Two- Party Authenticated Key Agreement Protocol for Grid Computing," IEEE, 2014.
- Lei Zhang, "Certificateless one-pass and two-party authenticated key agreement protocol and its extensions," Information Sciences, Elsevier 2014.
- Yasmine Abouelseoud, "Efficient Certificateless One- Pass Key Agreement Protocols," Proceedings of the World Congress on Engineering and Computer Science 2014 Vol II WCECS 2014.
- LI Gui-ying, HOU Meng-bo, ZHAO Chuan, XU Qiu- liang, "A Two-party Certificateless Authenticated Key Agreement Protocol with provable security," Ninth International Conference on Computational Intelligence and Security, IEEE 2013.
- Lei Zhang, "Provably Secure Certificateless One-Way and Two-Party Authenticated Key Agreement Protocol," ICISC 2012, LNCS 7839, pp. 217-230, Springer-Verlag 2013.
- PAN Jin, LIU Xiaoqiong, XIE Minghui, LIU Qiong, "Certificateless-based two-party authenticated Key agreement Protocols in a Multiple PKG Environment," International Conference on Computer Science and Network Technology, IEEE, Dec 2011.
- Lei Zhang, Futai Zhang, Qianhong Wua, Josep Domingo-Ferrer, "Simulatable certificateless two-party authenticated key agreement protocol," Information Sciences Vol. 180 pp. 1020-1030, Elsevier 2010.
- Liu Wenhao, Xu Chunxiang, Xu Jian, "Certificateless Two Party Key Agreement Protocol," International Conference on Multimedia Information Networking and Security, pp. 520-525, IEEE 2010.
- Mengbo Hou, Qiuliang Xu, "Constructing Secure Two-Party Authenticated Key Agreement Protocol Based on Certificateless Public Key Encryption Scheme," Proceedings of 4th International Conference on Computer Science & Education, IEEE 2009.
- Tarjei K. Mandt, Chik How Tan, "Certificateless Authenticated Two-Party Key Agreement Protocols," ASIAN 2006, LNCS 4435, pp. 37-44, Springer-Verlag 2007.
- SHI Yijuan, LI Jianhua., "Two-Party Authenticated Key Agreement in Cerfiticateless Public Key Cryptography," Wuhan University Journal of Natural Sciences, 12 (1), pp. 071-074, 2007.
- WANG Shengbao, CAO Zhenfu it, WANG Licheng, "Efficient Certificateless Authenticated Key Agreement Protocol from Pairings," Wuhan University Journal of Natural Sciences, Vol. 11 No. 5, pp. 1278-1282, 2006
- Mohammad Sabzinejad Farash, Mahmoud Ahmadian Attari, "A Pairing-free ID-based Key Agreement Protocol with Different PKGs," International Journal of Network Security, Vol.16, No.2, PP.144-149, Mar. 2014.
- Xuefei Cao, Weidong Kou, Xiaoni Du, "A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges," Information Sciences, 180 (2010) 2895-2903, Elsevier 2010.
- Robert W. Zhu, Guomin Yang, Duncan S. Wong, "An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices," Theoretical Computer Science 378 (2007) pp. 198-207, Elsevier 2007.
- Seyed-Mohsen Ghoreishi, Shukor Abd Razak, Ismail Fauzi Isnin and Hassan Chizari, "New Secure Identity- Based and Certificateless Authenticated Key Agreement Protocols Without Pairings," 2014 International Symposium on Biometrics and Security Technologies (ISBAST), IEEE 2014.
- Xiufeng Zhao, Qiuliang Xu, Hao Wang, "Provably Secure Identity-Based Key Agreement Protocols under Simple Assumption," International Conference on Information Theory and Information Security, IEEE, 2010. [28].
- Liang Ni, Gongliang Chen, Jianhua Li, Yanyan Hao, "Strongly secure identity-based authenticated key agreement protocols," Computers and Electrical Engineering 37 (2011) 205-217, Elsevier 2011.
- Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang, "Provably secure identity-based authenticated key agreement protocols with malicious private key generators," Information Sciences 181 (2011) 628-647, Elsevier 2011. [30].
- Takeshi Okamoto, Raylin Tso, Eiji Okamoto, "One- Way and Two-Party Authenticated ID-Based Key Agreement Protocols Using Pairing," MDAI 2005, LNAI 3558, pp. 122-133, Springer-Verlag 2005.
- Marko Hölbl, Tatjana Welzer, Boštjan Brumen, "An improved two-party identity-based authenticated key agreement protocol using pairings," Journal of Computer and System Sciences 78 (2012) pp. 142-150, Elsevier 2012. [32].
- NI Liang, CHEN GongLiang, LI JianHua, HAO YanYan, "Strongly secure identity-based authenticated key agreement protocols in the escrow mode," Science China Information Sciences, 55, 2012.
- Chu-Hsing Lin, Hsiu-Hsia Lin, "Secure One-round Tripartite Authenticated Key Agreement Protocol from Weil pairing," Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA'05), IEEE 2005.
- Minghui Zheng, Huihua Zhou, Jing Chen, "An efficient protocol for two-party explicit authenticated key agreement," Concurrency and Computation: Practice and Experience (2013), Published online in Wiley Online Library (wileyonlinelibrary.com).
- Ch. Asha Jyothi, G. Narsimha, J. Prathap, Gorti Vnkv Subba Rao, "Two-Party Threshold Key Agreement Protocol for Manets using Pairings," Global Journal of Computer Science and Technology: E Network, Web & Security, Volume 15 Issue 4 Version 1.0 July-1 2015.
- Ch. Asha Jyothi, G. Narsimha, J. Prathap, " Two-Party Key Agreement Protocol for MANETs based on Verifiable Secret Sharing Scheme," International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10, Number 16 (2015) pp 36890-36894.
- Weijun Zhang , Yonghui Han , Lulin Liu, "A Novel Key Agreement Protocol Based on Bilinear Pairing," 3rd International Conference on Biomedical Engineering and Informatics (BMEI 2010), pp. 2717-2720, IEEE 2010.
- D. Freeman, M. Scott, E. Teske, "A taxonomy of pairing-friendly elliptic curves," Journal of Cryptology (2010) 23, pp. 224-280.
- Hongtu Li, Liang Hu, Wei Yuan, Jianfeng Chu, Hongwei Li, "A key distribution protocol based on WDH assumption," Advanced in Control Engineeringand Information Science, Procedia Engineering 15 (2011) 1695 -1699, Elsevier, 2011.