MA Zhuo, LI Fenghua, MA Jianfeng, et al., “CL-TAP:An Efficient Certificateless Based Trusted Access Protocol for WLAN,” Chinese Journal of Electronics, vol. 23, no. 1, pp. 142-146, 2014,
Citation: MA Zhuo, LI Fenghua, MA Jianfeng, et al., “CL-TAP:An Efficient Certificateless Based Trusted Access Protocol for WLAN,” Chinese Journal of Electronics, vol. 23, no. 1, pp. 142-146, 2014,

CL-TAP:An Efficient Certificateless Based Trusted Access Protocol for WLAN

Funds:  This paper was supported in part by the National Natural Science Foundation of China (No. U1135002, No.61100233, No.61100230, No.61202389, No.61202390, No.61173135, No.61170251), Fundamental Research Funds for the Central Universities, Natural Science Basic Research Plan in Shaanxi Province of China (No.2012JM8030), Beijing Natural Science Foundation (No.4102056), and National High Technology Research and Development Program of China (No.2012AA013102).
  • Received Date: 2011-12-01
  • Rev Recd Date: 2013-03-01
  • Publish Date: 2014-01-05
  • Based on the certificateless public key cryptography and the trusted computing technologies, a certificateless based trusted access protocol for WLAN (Wireless local area networks) is proposed. Such protocol realizes the mutual authentication and unicast session key agreement between STA and AP within 3 protocol rounds. In particular, the platform authentication and integrity verification are achieved during the authentication procedure. The security properties of the new protocol are examined using the Extended Canetti-Krawczyk security model. The analytic comparisons show that the new protocol is very efficient in both computing and communications.
  • loading
  • IEEE P802.11i/D10.0. Medium Access Control (MAC) Security Enhancements, Amendment 6 to IEEE Standard for Information technology Telecommunications and information exchange between systems Local and metropolitan area networks Specific requirements Part 11: Wireless Medium Access Control. 2004.
    Chang-Hua He, M. Sundararajan, A. Datta, A. Derek, J.C. Mitchell, A modular correctness proof of IEEE 802.11i and TLS, Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05), Alexandria, VA, USA, pp.2-15, 2005.
    Trusted Computing Group, TCG Trusted Network Connect TNC Architecture for Interoperability specification Version 1.3 Revision 6. 2008. https: //
    Jian Wang, Yanheng Liu and Yu Jiao,"Novel access and remediation scheme in hierarchical trusted network", Computer Communications, Vol.34, No.3, pp.375-383, 2011.
    Aarthi Nagarajan, Vijay Varadharajan,"Dynamic trust enhanced security model for trusted platform based services", Article Future Generation Computer Systems, Vol.27, No.5, pp.564-573, 2011.
    R. Housley, W. Polk, W. Ford, et al., Internet X.509 Public Key Infrastructure Certificate And Certificate Revocation List (CRL) Profile, The Internet Engineering Task Force (IETF), RFC 3280, 2002
    P. Gutmann,"PKI: It's not dead, just resting", IEEE Computer, Vol.35, No.8, pp.41-49, 2002.
    A. Shamir,"Identity-based cryptosystems and signature schemes", Proceedings of Advances in Cryptology CRYPTO'84, Vol.196 of Lecture Notes in Computer Science, Springer-Verlag, pp.47-53, 1985.
    S.S. Al-Riyami, K. Paterson,"Certificateless public key cryptography", Proceedings of Advances in Cryptology Asiacrypt 2003, Vol.2894 of Lecture Notes in Computer Science, SpringerVerlag, pp.452-473, 2003.
    D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology CRYPTO 2001, Vol.2139 of Lecture Notes in Computer Science. Springer-Verlag, pp.213229, 2001.
    C.J. Kudla,"Special signature schemes and key agreement protocols", Ph.D. Thesis, Royal Holloway: University of London, 2006.
    B. LaMacchia, K. Lauter, A. Mityagin,"Stronger security of authenticated key exchange", Provable Security 2007, Vol.4784 of Lecture Notes in Computer Science. Berlin: Springer-Verlag, pp.1-16, 2007.
    R. Canetti, H. Krawczyk,"Analysis of key-exchange protocols and their use for building secure channels", Advances in Cryptology EUROCRYPT '01, Springer-Verlag, pp.453-474, 2001.
    W. Dai, Crypto++ 5.6.0 Benchmarks. https://www.cryptopp. com/benchmarks.html.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (498) PDF downloads(1119) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint