CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Robust Framework for Certificateless Authenticated Key Agreement Protocol

Published on February 2013 by Smita R. Chunamari, D. G. Borse
International Conference on Recent Trends in Information Technology and Computer Science 2012
Foundation of Computer Science USA
ICRTITCS2012 - Number 8
February 2013
Authors: Smita R. Chunamari, D. G. Borse
8061c823-340b-4cd4-be9a-91b31d075f27

Smita R. Chunamari, D. G. Borse . Robust Framework for Certificateless Authenticated Key Agreement Protocol. International Conference on Recent Trends in Information Technology and Computer Science 2012. ICRTITCS2012, 8 (February 2013), 27-30.

@article{
author = { Smita R. Chunamari, D. G. Borse },
title = { Robust Framework for Certificateless Authenticated Key Agreement Protocol },
journal = { International Conference on Recent Trends in Information Technology and Computer Science 2012 },
issue_date = { February 2013 },
volume = { ICRTITCS2012 },
number = { 8 },
month = { February },
year = { 2013 },
issn = 0975-8887,
pages = { 27-30 },
numpages = 4,
url = { /proceedings/icrtitcs2012/number8/10304-1428/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Recent Trends in Information Technology and Computer Science 2012
%A Smita R. Chunamari
%A D. G. Borse
%T Robust Framework for Certificateless Authenticated Key Agreement Protocol
%J International Conference on Recent Trends in Information Technology and Computer Science 2012
%@ 0975-8887
%V ICRTITCS2012
%N 8
%P 27-30
%D 2013
%I International Journal of Computer Applications
Abstract

Authenticated key agreement protocol is exploited to share a secret key for encrypting information being transferred between two or additional parties over a public network. In this implementation can produce multiple public keys for a corresponding private key. In this paper, an alternative key generation technique is proposed for certificate less public key cryptography in order to have one public key for one private key. This will improve the security features of the relevant key generation.

References
  1. A. Shamir. Identity-based cryptosystems and signature schemes, In G. R. Blakley and D. Chaum, editors, Advances in Cryptology - CRYPTO'84, volume 196 of Lecture Notes in Computer Science, pages 47-53. Springer-Verlag, 1985.
  2. S. S. Al-Riyami and K. Paterson. Certificateless Public Key Cryptography. In C. S. Laih, editor, Advances in Cryptology - Asiacrypt 2003, volume 2894 of Lecture Notes in Computer Science, pages 452-473. Springer-Verlag, 2003.
  3. T. K. Mandt and C. H. Tan, "Certificateless authenticated two-party key agreement protocols," in Proc. ASIAN'06, Berlin, Heidelberg: Springer-Verlag, 2007, p. 37–44.
  4. G. Lippold, C. Boyd, and J. Gonzalez Nieto, "Strongly secure certificateless key agreement," in Proc. Pairing '09, Berlin, Heidelberg, Germany: Springer- Verlag, 2009, p. 206–230.
  5. S. Wang, Z. Cao, and H. Bao, "Efficient certificateless authentication and key agreement (cl-ak) for grid computing," International Journal of Network Security, vol. 7, no. 3, pp. 342–347, 2006.
  6. Y. Sun and F. Zhang, "Secure certificateless public key encryption without redundancy," Cryptology ePrint Archive, Report 2008/487, 2008, http://eprint. iacr. org/.
  7. B. Libert and J. jacques Quisquater, "On constructing certificateless cryptosystems from identity based encryption," in PKC 2006. Springer- Verlag, 2006, p. 474–490.
  8. Morteza Arifi, An ID-Based Key Agreement Protocol Based on ECC Among Users of Separate Networks, International Journal of Computer Science and Security, 2012.
  9. P. S. L. M. Barreto, H. Y. Kim, B. Lynn, M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Advances in Cryptology -- Crypto'2002, Lecture Notes on Computer Science 2442, Springer-Verlag (2002), pp. 354--368.
  10. Z. Zhang and D. Feng. On the Security of a Certificateless Public-Key Encryption. Cryptology ePrint Archive, Report 2005/426.
  11. A. W. Dent and C. Kudla. On Proofs of Security for Certificateless Cryptosystems. Cryptology ePrint Archive, Report 2005/426.
Index Terms

Computer Science
Information Sciences

Keywords

Authenticated Key Agreement Key Generation Certificate Less Public Key Cryptography Identity-based Public Key Cryptography Efficiency Security