Journal on Communications ›› 2016, Vol. 37 ›› Issue (7): 161-171.doi: 10.11959/j.issn.1000-436x.2016145

• Academic communication • Previous Articles     Next Articles

Hierarchical certificateless authenticated key agreement protocol

Hang SU,Jian-wei LIU,Rui TAO   

  1. School of Electronic and Information Engineering, Beihang University, Beijing 100191, China
  • Online:2016-07-25 Published:2016-07-28
  • Supported by:
    The National Basic Research Program of China (973 Program);The National Natural Sci-ence Foundation of China;The Fundamental Research Funds for the Central Universities

Abstract:

A hierarchical certificateless authenticated key agreement protocol was proposed, and the proposed protocol was proved secure in extended Canetti-Krawczyk (eCK) model, the security of the protocol was based on the computa-tional Diffie-Hellman assumption. In the protocol, a root PKG authenticates the identity and generates a partial private key for lower-level PKG which authenticate the identity and generate a partial private key for users, private key generated by partial private key and user selected secret value. Comparing with the existing protocols, the protocol is efficient without bilinear pairings computation.

Key words: certificateless, hierarchical authenticated key agreement protocol, computational Diffie-Hellman assumption, eCK model

No Suggested Reading articles found!