Secure pairing-free two-party certificateless authenticated key agreement protocol with minimal computational complexity

dc.contributor.authorGhoreishi, Seyedmohsen
dc.date.accessioned2024-02-21T23:45:16Z
dc.date.available2024-02-21T23:45:16Z
dc.date.issued2019
dc.descriptionThesis (PhD. (Computer Science))
dc.description.abstractKey agreement protocols play a vital role in maintaining security in many critical applications due to the importance of the secret key. Bilinear pairing was commonly used in designing secure protocols for the last several years; however, high computational complexity of this operation has been the main obstacle towards its practicality. Therefore, implementation of Elliptic-curve based operations, instead of bilinear pairings, has become popular recently, and pairing-free key agreement protocols have been explored in many studies. A considerable amount of literatures has been published on pairing-free key agreement protocols in the context of Public Key Cryptography (PKC). Simpler key management and non-existence of key escrow problem make certificateless PKC more appealing in practice. However, achieving certificateless pairing-free two-party authenticated key agreement protocols (CL-AKA) that provide high level of security with low computational complexity, remains a challenge in the research area. This research presents a secure and lightweight pairingfree CL-AKA protocol named CL2AKA (CertificateLess 2-party Authenticated Key Agreement). The properties of CL2AKA protocol is that, it is computationally lightweight while communication overhead remains the same as existing protocols of related works. The results indicate that CL2AKA protocol is 21% computationally less complex than the most efficient pairing-free CL-AKA protocol (KKC-13) and 53% less in comparison with the pairing-free CL-AKA protocol with highest level of security guarantee (SWZ-13). Security of CL2AKA protocol is evaluated based on provable security evaluation method under the strong eCK model. It is also proven that the CL2AKA supports all of the security requirements which are necessary for authenticated key agreement protocols. Besides the CL2AKA as the main finding of this research work, there are six pairing-free CL-AKA protocols presented as CL2AKA basic version protocols, which were the outcomes of several attempts in designing the CL2AKA.
dc.description.sponsorshipFaculty of Engineering - School of Computing
dc.identifier.urihttp://openscience.utm.my/handle/123456789/1013
dc.language.isoen
dc.publisherUniversiti Teknologi Malaysia
dc.subjectPublic key cryptography
dc.subjectComputer networks—Security measures—Computer programs
dc.subjectKey agreement protocols (Computer network protocols)
dc.titleSecure pairing-free two-party certificateless authenticated key agreement protocol with minimal computational complexity
dc.typeThesis
dc.typeDataset
Files
Original bundle
Now showing 1 - 3 of 3
Loading...
Thumbnail Image
Name:
SeyedmohsenGhoreishiPSC2019_A.pdf
Size:
69.15 KB
Format:
Adobe Portable Document Format
Description:
COMPUTATIONAL COM PLEXITY OF THE RELATED WORKS
Loading...
Thumbnail Image
Name:
SeyedmohsenGhoreishiPSC2019_B.pdf
Size:
220.7 KB
Format:
Adobe Portable Document Format
Description:
SUPPORT OF AKA SECURITY REQUIREMENTS IN RELATED WORKS
Loading...
Thumbnail Image
Name:
SeyedmohsenGhoreishiPSC2019_C.pdf
Size:
74.2 KB
Format:
Adobe Portable Document Format
Description:
SECURITY ANALYSIS OF THE RELATED WORKS BASED ON ECK MODELS
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: