Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 20 Jan 2012

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Certificateless Key Agreement in the Standard Model

Lippold, G. and Nieto, J. G.

    We show how to construct a certificateless key agreement protocol from the certificateless key encapsulation mechanism introduced by Lippold et al. (2009a) in ICISC 2009 using the Boyd et al. (2008) protocol from ACISP 2008. We introduce the Canetti- Krawczyk (CK) model for certificateless cryptography, give security notions for Type I and Type II adversaries in the CK model, and highlight the differences to the existing e2CK model discussed by Lippold et al. (2009b). The resulting CK model is more relaxed thus giving more power to the adversary than the original CK model. Keywords: key agreement, key exchange, key encapsulation mechanism, certificateless, standard model, Diffie-Hellman
Cite as: Lippold, G. and Nieto, J. G. (2010). Certificateless Key Agreement in the Standard Model. In Proc. Eighth Australasian Information Security Conference (AISC 2010) Brisbane, Australia. CRPIT, 105. Boyd, C. and Susilo, W. Eds., ACS. 75-85
pdf (from crpit.com) pdf (local if available) BibTeX EndNote GS