Simulatable Certificateless Two-Party Authenticated Key Agreement Protocol

Mandt T K, Tan C H. Key two-party agreement protocols authenticated without a certificate. In: Proceedings of the 11th Asian Computing Science Conference, Tokyo, 2006. 37-44 The rest of the document is organized as follows. Section 2 defines the security model for AKA protocols without a two-sided certificate. We offer our Aka protocol without a simulable certificate in Section 3. In Section 4, the protocol is formally analyzed according to the standard assumptions of the BDH and the CoH. Section 5 finalizes the document. The safety of our protocol depends on the standard CDH and BDH assumptions that will be briefly verified in the future.

Luo M, Wen Y Y, Zhao H. An improved authentication and key agreement mechanism for SIPs with und certificate-free cryptography with public keys. In: Proceedings of the 9th International Conference for Young Computer Scientists, Hunan, 2008. 1577-1582 Sun, H., Wen, Q. Li, W. A key memorandum of understanding without coupling, without a certificate, in the ACCEPTANCE cdH. Sci. China Inf. Sci.

59, 32109 (2016). doi.org/10.1007/s11432-015-5303-0 Lippold G, Boyd C, Manuel Gonzalez Nieto J. Stark without certificate. In: Proceedings of 3rd International Conference on Pairing-Based Cryptography, Palo Alto, 2009. 206-230 Sun H Y, Wen Q Y, Zhang H, et al. A protocol without a very safe coupling, without a certificate, for the agreement of quotas for appliances with low electricity consumption. Inf Technol Control, 2013, 42: 113-123 Smart Grid is a fully automated transmission system. It monitors and controls each user and grid node to ensure the two-way flow of information and electricity between all nodes. This is an important question about how to achieve a secure exchange of information between many communicators in smart Grid environments.

Authenticated Key Agreement (AKA) is a good option to allow secure communication between the smart meter and the utility. In recent years, several AKA programs have been offered for smart Grid environments. These systems have two flaws: first, they are created from the traditional public key infrastructure (PKI) or identity-based cryptography (IBC), which confronts them with a certificate management problem or a key problem for trust problems. Second, the safety evidence for these systems was made in the Random Oracle Model (ROM). It is known that a cryptographic pattern that has proven safe in ROME is not necessarily safe in practice. In this article, we present an authenticated authenticated (CL2PAKA) und certificateed key system for smart grids, and then provide security evidence in the standard model. Our scheme does not require coupling operations and requires only four scale multiplication operations, making it more efficient than previous ones. Neither L, Chen G L, Li J H, et al. Key agreement protocols authenticated in fiduciary mode based on identity. Sci China Inf Sci, 2013, 56: 082113 Shi Y J, Li J H. Key agreement bipartisan authentication in cryptography without certificate with public key.

Wuhan Univ J Nat Sci, 2007, 12:71-74 Cl-PKC also offers an effective implicit authentication mechanism, so a user does not need to obtain a certificate from the certification body for the authenticity of his public key. Since its emergence, CL-PKC has generated a great deal of interest in the research community and many uncertable AKA protocols have been introduced [7,11,13,14]. In an AKA protocol with a passport and two participants, only one participant is required to send information to the other during the minutes. Aksaless AK protocols with two pages are important tools for securing communications via open networks. We presented a formal definition of the security model for AKA protocols with two parties in the cryptographic arrangement without a certificate. According to this definition, we have implemented an effective, certificateless AKA protocol with two pages. The proposed protocol was safe under some well-verified assumptions. Our program is also effective and practical, as each party needs only a Sarr A P, Elbaz-Vincent P, Bajard J. A new security model for the agreement with authenticated keys.

This entry was posted in Uncategorized. Bookmark the permalink.