1. Introduction
The authenticated key exchange protocols (AKE) based on conventional certificates are still widely deployed. Even in relatively new standards, such as TLS 1.3 [1], certificate-based cipher suites remains significant. Theoretical frameworks for evaluating protocol security, such as extensions of the Bellare–Rogaway model (BR) [2], eCK model [3] and universal composability (UC) [4], are usually used while assuming the existence of certificate-based public key infrastructure (PKI) [5,6].
However, the drawbacks of certificate-based infrastructure are also obvious. Ever-growing certificate revocation lists (CRL), floods of Online-Certificate States Protocol (OCSP) requests and the complicated logic of certificate chain verification may not fit into constrained devices [7] in the Internet of Things (IoT), where 50 KB RAM is already a luxury. Turning to pure symmetric key cryptography is not optimal in practice, either, as that introduces heterogeneity in the infrastructure, and scales poorly.
Therefore, exploring practical certificate-less AKE protocols (CL-AKE) is extremely meaningful.
CL-AKE solutions can use certificate-less public key encryption (CL-PKE) or signature (CL-SIG) to replace certificate chains. The syntax of the scheme and the types of adversaries have been defined for the first CL-PKE and CL-SIG by Al-Riyami and Paterson [8]. Unlike the key generation center (KGC) in identity-based or attribute-based cryptography (IBC, ABC), the KGC in CL-PKE can only compute partial private keys of users, so solutions based on CL-PKC do not suffer from the key escrow problem. The initial construction of CL-PKC in [8] is bilinear pairing based. Later, in 2007, Crampton et al. proposed a password-enabled and certificate-free grid security infrastructure (PECF-GSI) [9]. The protocols in PECF-GSI use bilinear pairing as heavily as the original Al-Ruyami–Paterson schemes. Other pairing-based certificate-less solutions in the last two decades [10,11,12,13,14,15] have experienced various improvement and trade-offs.
One of the major challenges for building certificate-less infrastructure is to optimize the efficiency of every protocol in its cryptographic core. As pointed out in [16], a bilinear pairing operation is about ten-times slower than a point multiplication on elliptic curves (EC), so it is necessary to avoid pairing and also to trim the redundant components, such as signature generation or decryption, off the CL-AKE main protocol.
Another critical challenge is establishing a unified security model for the two stages: user key registration and AKE. An adversary against CL-PKE/SIG with key registration [8] has the power to corrupt users, corrupt KGC and register new public keys. However, whether can see any message exchanged between an honest user and the KGC is undefined. In contrast, adversaries against AKE protocols have different powers in BR [2], eCK [3] and other game-based models [5]. These adversaries can tamper with messages and corrupt parties but may not be allowed to register new public keys. Although it has not been theoretically ruled out that messages in the key registration phase can threaten the AKE phase, most previous works on CL-AKE [15,17,18,19] used separate game-based models for the generation/registration of user key pairs (in a secure channel or out of band channel) and AKE protocol (in the public channel), or ignore the messages exchanged during the registration.
1.1. Our Contribution and Paper Outline
To meet the challenges mentioned above, we make the following contribution in this paper.
-
We propose a practical cryptographic core of a certificate-less (CL) infrastructure, including user key registration and CL-AKE. The protocols are constructed from elliptic curves (EC) without pairing or any signature so that they can be easily supported by most industrial public key cryptography libraries for constrained devices. To the best of our knowledge, our AKE protocol also enjoys the optimal number of point multiplication over EC compared to other pairing-free solutions (see Table 1).
-
We integrate CL-AKE into TLS ciphersuites [1]. The performance is compared with TLS-DHE with certificates in data volume and computation. We also deploy and test the slim implementation of CL-AKE without the TLS stack on constrained IoT devices. Subsequently, the evaluation confirms the real-world efficiency of our proposal.
-
Our new provably secure CL signature scheme with two-way public key reconstruction can be of independent interest.
After the introduction, we present the necessary notation and preliminaries in Section 2. As a starting point for building CL-AKE and proving its security in the game-based framework, we introduce a new certificate-less and paring-free signature scheme with two-way public key reconstruction in Section 3. The game-based AKE security model is presented in Section 4. The new certificate-less key registration, CL-AKE protocols and the security analysis can be found in Section 5. We present the integration to TLS and the evaluation in Section 6.
1.2. Technical Road Map
The cost of verifying a conventional certificate chain is proportional to the number of certificates on the chain. More specifically, to verify the end-level signature, a user has to verify the first-level signature with the public key in the root certificate and then the second-level signature with the public key of the first-level certificate. The verification continues until the signature on the end-level certificate is verified. For EC-based signatures, the verification usually involves a significant amount of point multiplication in an EC group.
A CL-SIG is designed to identify and utilize shortcuts during the verification process. Ideally, a user only has to verify the end-level public key with the root public key, usually the public key of the KGC. This verification can also be enforced implicitly through computation. If an end-level public key can be reconstructed by any honest user using the KGC’s public key and the identifier , then intuitively, the verification of is almost finished.
The shortcut we implement in CL-SIG is to replace the signature verification with a hash function, which is considerably more efficient. The hash function maps binary strings to elements in an integer group. If a public key is an EC point that can be encoded as a binary string, and the corresponding private key is an integer in a group, provides an efficient way to bind the public keys , and the identifier with the private key. Moreover, to make CL-SIG fully functional, there must be two alternatives to how can be reconstructed. One is through , i.e., the way that only the key owner can take, and another one is through the use of , and some additional information , i.e., any user can do it. For details, we refer the reader to Figure 1 in Section 3.
We implement another shortcut to construct CL-AKE from CL-SIG. Instead of using the signing and verification algorithms in our CL-SIG, we keep only the public key reconstruction algorithms in the AKE. An AKE participant can reliably reconstruct its peer’s public key and then use with its own ephemeral key materials to derive the session keys. A message authenticate code is used to confirm the knowledge of all related secrets, replacing the expensive signature verification. For details, we refer the reader to Figure 2 in Section 5.
In summary, we replace as many public key operations (e.g., signature and point multiplication) with efficient symmetric essential operations (e.g., hash, message authentication code and pseudo-random function) as possible, while keeping the CL solution provably secure. The resulting CL-AKE enjoys forward secrecy due to the Gap Diffie–Hellman problem’s hardness and the new CL-SIG’s security.
1.3. Related Work
We review existing approaches to construct certificate-less AKE and authentication infrastructure, including identity-based cryptography, attribute-based cryptography, and CL-AKE with and without pairing.
1.3.1. IBC and ABC-Based CL Solutions
An important line of research is replacing certificate-based PKI with identity-based cryptography (IBC) [21]. In principle, the IBC public key is a user identity itself, and is embedded algebraically into the user’s secret key by KGC with its master secret key . IBC eliminates certificates and simplifies the management of public keys greatly, but it suffers from the key escrow problem. More specifically, in the standard syntax of IBC, such as in [21,22], every user secret key is derived from its and a system-wide static of KGC. Once is compromised, the adversary can use to recover all previous user secret keys, destroying forward secrecy (FS). Attribute-based cryptography (ABC) [23] can be seen as a generalization of IBC. Instead of using one single identity, ABC uses a combination of multiple attributes to encrypt a message. However, the key escrow problem remains if any user secret key is derivable from and the attribute combinations alone. This KGC setting is preserved in various IBC-/ABC-based solutions [24,25], and some are flawed or without FS later [15,26].
1.3.2. CL-PKC and Pairing-Based Attempts
The notion of certificate-less public key cryptography (CL-PKC) was first formalized in 2003 by Al-Riyami and Paterson [8]. As the KGC in CL-PKC can only compute partial private keys for users, solutions based on CL-PKC do not inherently suffer from the key escrow problem. Later, Crampton et al. proposed a password-enabled and certificate-free grid security infrastructure (PECF-GSI) [9] in 2007. The protocols in PECF-GSI use bilinear pairing heavily as the original Al-Ruyami–Paterson schemes.
Various pairing-based attempts have been made for different trade-offs between security and efficiency. In 2012, Sanaa Taha et al. proposed certificate-less authentication key agreement (CL-AKA), a link-layer authentication and key agreement protocol based on CL-PKC, which does not consider ephemeral key leakage attacks [10]. Maity et al. proposed a novel certificate-less on-demand public key management (CL-PKM) protocol for self-organized MANETs [27]. Memon et al. proposed two authentication protocols based on Al-Ruyami–Paterson CL-PKC and IBE [11,12] in 2015. The security is analyzed with BAN-logic. Balakrishnan et al. proposed a practical email system based on CL-PKC with user authentication and key exchange in 2016, but the encryption of messages actually bears no forward secrecy when the receiver’s long-term keys are exposed [13]. Bala et al. proposed a secure key management and authentication protocol in 2017, making use of hybrid cryptography that involves both symmetric and CL-PKC but without formal security models [14]. Saeed et al. proposed a lightweight online/offline certificate-less signature (L-OOCLS) and a heterogeneous remote anonymous authentication protocol (HRAAP) for IoT applications in 2018 [15]. The L-OOCLS scheme is pairing-based and provably secure in random oracle model. The proposed HRAAP, however, cannot be proved secure in the BR or eCK model as the session key is directly used in handshake.
1.3.3. Pairing-Free CL-AKE
Pairin-free CL solutions have also been proposed. Song et al. [16] proposed a secure lightweight certificate-less authenticated key agreement (CL-AKA) for securing vehicle-to-vehicle (V2V) communication without using pairings. Unfortunately, the protocols need a large number of exponentiations in an integer group. Yang and Tan [17] proposed a CL-AKA that is provably secure in a dedicated model. He et al. [19] proposed efficient CL-AKA with security proofs in an extended eCK model dedicated to the key agreement part alone. Farouk et al. also introduced an efficient pairing-free CL-AKA protocol for grid computing environments [18] by extending the work of He et al. [19]. In 2018, KhanSafi et al. proposed an authentication framework for the message dissemination of toll payment information with a pairing-free CL-PKC system [20]. Unfortunately, there is no security proof provided in [19,20].
Defining a unified security model for each stage of CL-AKE is not a trivial task. On the one hand, the adversary for CL-PKE or CL-SIG in [8] has the power to corrupt users, corrupt the KGC or register new public keys, but cannot see any messages exchanged between the user and KGC. On the other hand, adversaries against authenticated key exchange (AKE) protocols, however, have different powers in BR [2], eCK [3] and other game-based models [5]. These adversaries can tamper with messages and corrupt parties (users) but cannot register new public keys. However, it has not been confirmed or denied whether messages in the key pair generation phase can threaten the AKE phase. Most previous works on CL-AKE [10,15,16,18,19] used separate models for the generation of user key pairs (in a secure channel or out-of-band channel) and AKE protocol (in public channels), or even ignore the messages exchanged during the key pair generation.
From 2021 till now, lattice-based (LBC) and isogeny-based cryptography have been introduced for post-quantum security, and new constructions have been proposed [28,29,30,31,32]. However, deploying LBC on constrained devices remains challenging now and in the near future, especially when facing the conflict between the large key/ciphertext size required by LBC and the limited RAM/storage on constrained devices [33].
2. Notation and Preliminaries
In this section, we introduce the necessary cryptographic building blocks of our solution.
2.1. Notations
We use and to denote the security parameter. Let be the set of integers from 1 to n. If S is a set, means sampling a uniformly random element a from S. If is an algorithm, and denote that outputs m on input x with the help of another oracle . means concatenating two binary strings X and Y. We use to denote the probability that event E happens if action A is taken. Other notations will be introduced as needed.
2.2. Cryptographic Primitives and Hardness Assumptions
Message authentication code (MAC) is frequently used in AKE protocols for message integrity and can also work as a proof of the knowledge of the secret key.
(Message Authentication Code, MAC). A MAC scheme consists of three algorithms: , and described below.
. The non-deterministic key generation algorithm takes the security parameter as the input and outputs the secret key .
. The (non-deterministic) message tagging algorithm takes the secret key and a message m as the input and outputs the authentication tag .
. The deterministic tag verification algorithm takes the MAC secret key , a message m and a tag as input and outputs a boolean value b. b is if is a valid MAC tag on m.
Hash functions are used for obtaining a digest of the input. The digest can be of fixed length or in a finite domain.
(Collision-resistant Hash Function). A hash function is collision-resistant if there exists a negligible function such that for any algorithm with running time bounded by , it holds that
where is the message space, and is the hash image space.Pseudo-random function (PRF) can be used for key derivation as in TLS 1.3 [1]. PRF ensures that the output looks random if the secret key is not leaked.
(Pseudo-random function, PRF). A pseudo-random function consists of two algorithms, and , described below.
. The non-deterministic key generation algorithm takes the security parameter as the input and outputs the secret key .
. The PRF evaluation algorithm takes as the input the secret key and a value x in the domain and outputs an image y.
The Schnorr signature scheme can be seen as a general template for (EC-)group-based signature. The most critical operation is the scalar-point multiplication. Note that the verification algorithm of Schnorr needs two point multiplication, one on the base point G and one on the non-base point . In contrast, the signing only needs one base point multiplication. In practice, base point multiplication has been optimized for each EC group, so it is usually much quicker than non-base point multiplication.
(Schnorr signature scheme). Let be a collision-resistant cryptographic hash function. The Schnorr signature scheme consists of three algorithms , , described below.
. The non-deterministic key generation algorithm takes the security parameter as the input and outputs the public parameters , the public key and the corresponding private key , where , G is the generator of group of large prime order q, , with , and maps any bit string to an integer in .
. This signing algorithm takes the private key and the message m as the input. It chooses , computes , , and . It outputs the signature .
. This verification algorithm takes a public key , a message m and a signature as input. It first computes , then outputs if , and otherwise.
We refer the reader to standard cryptography literature, such as [34], for the security definition of all the cryptographic primitives above and Diffie–Hellman key exchange (DH).
(Discrete logarithm, DL). Let be a group generation algorithm which outputs , where is the description of a cyclic group, with G as its generator and q as its order. The discrete logarithm (DL) assumption with respect to states that the following quantity is negligible for any probabilistic polynomial time (PPT) adversary .
The proof of Schnorr’s security or schemes that use group elements with hash usually relies on the hardness of the Discrete logarithm problem above. For proving security of AKE, we need the gap computational Diffie–Hellman Problem (), which is defined as: given public parameter and for , compute the element Z = with the help of a Decisional Diffie–Hellman Oracle , i.e., answers whether a given quadruple has .
(Hardness of ). is hard with respect to , if for any PPT adversary , the following quantity is negligible.
In this section, we have reviewed the most relevant cryptographic primitives and hard problems. In the next section, we show how to construct an efficient CL-SIG from them.
3. New Certificate-Less Signature with Two-Way Reconstructable Public Key
We construct an extended certificate-less signature (CL-SIG) as the starting point. Although signing and verification are not used in our CL-AKE protocol, the security of simplifies the argument in the game-based framework.
(CL-SIG with Two-way Reconstructable PK). A certificate-less signature scheme with a two-way reconstructable public key (CL-SIG-TRK) is a tuple of seven algorithms , defined as follows.
. The (non-deterministic) algorithm takes in the security parameter and outputs the system parameters and the master key .
. This algorithm outputs party i’s secret value and auxiliary information on input and the identifier .
. This partial key extraction algorithm outputs party i’s partial private key and the partial public key on input , , and . . This algorithm takes as input , , and , and outputs i’s public key .
. This public key reconstruction algorithm takes as input , identity and the partial public key , and it outputs the complete public key of party i. . This algorithm takes , the private signing key and a valid message m as input and outputs a signature σ.
. This algorithm outputs a bit value on input , , m and a signature σ. The value b is if σ is a valid signature on m with respect to and .
Algorithms and outputs in
The security game for in [8] is an EUF-CMA game extended with queries in Table 2. In principle, Type I adversaries can replace public keys but cannot get KGC’s private key, while Type II adversaries can have the KGC’s private key but cannot replace public keys.
More specifically, let be the challenged party and the forgery. Besides being forbidden to ask , the restrictions on a Type I adversary are:
cannot query .
For any , cannot query , if it has previously queried .
cannot query before submitting forgery, if it has previously asked .
has not queried before submitting .
Besides being forbidden to ask for any i, the restrictions on a Type II adversary are:
cannot ask .
has not queried before submitting .
Our new CL-SIG-TRK is in Figure 1, where is the Schnorr signature scheme in Definition 4. The security of is summarized in Theorem 1. We still stick to the original syntax of . On the other hand, the extension, , also provides more flexibility in the verification, as a signature can now be verified with itself and the KGC public key . We will show how a receiver of the partial public key can check and use it efficiently in AKE in Section 5.
(Security of ). If the discrete logarithm problem is hard with respect to group , then the CL-SIG-TRK scheme is existentially unforgeable against chosen message attack (EUF-CMA) in the presence of Type I and Type II adversaries in the random oracle model, where Type I and Type II adversaries have access to queries defined in [8].
More specifically, if there exists against , then there exist DL problem solvers and , such that
(1)
where is the advantage of any PPT adversary against , and the advantage of and against , respectively, the advantage of any PPT adversary against Schnorr Signature , d the maximal number of clients with distinct identifiers, the number of queries to random oracle used in , the number of queries to random oracle used in Schnorr , and the number of signing queries.We defer the proof of Theorem 1 to Appendix A, as it relies on the multiple forking lemmma in [35] and is rather technical. Intuitively, the multiple-forking lemma helps us connect the CL-SIG security to the hardness of (Definition 5).
From Theorem 1, we can have Corollary 1, which is necessary for proving the security of the user key registration protocol (see Figure 3 in Section 5). The proof of Corollary 1 is quite straight forward, as unforgeable CL-SIG implies unforgeable and non-replaceable key pairs.
If the advantages of Type I and Type II adversaries against are upper-bounded by , the probability that any public-private key pair is forgeable or replaceable by Type I and Type II adversaries is also upper-bounded by .
Now, we have all the necessary tools to construct a CL-AKE with forward secrecy [1].
4. Game-Based Security Model for CL-AKE
In this section, we define a security model for certificate-less AKE protocols. We assume each participant communicates through a public network, and the adversary controls all the data traffic. This setting is formalized in the execution environment.
4.1. Protocol Execution Environment
Let denote the session key space, and is the pre-shared key space. Let be the set of all parties for ℓ, where a potential participant has a long-term pre-shared key that corresponds to its identity i.
Each can have a polynomial number of process oracles , where is an index with . A unique session identifier labels a protocol session between a client and a server instance. Moreover, we assume that besides the access to long-term secrets, such as private keys, each oracle maintains a list of independent internal state variables as described in the following list (Table 3).
The internal state of each oracle is initialized as (, , , , ) = (∅, ∅, ∅, ∅, ∅), where ∅ denotes the empty string. We assume that the session key is assigned to the variable such that if each oracle completes the execution with an internal state .
4.2. Adversary Model
An active adversary can interact with the execution environment by issuing the queries below. Queries in the
-
: can use this query to send any message m of its choice to oracle . The oracle will respond according to the protocol specification and its internal state. If m consists of a special symbol ⊤ (), then will respond with the first protocol message.
-
This query allows to register a new party with given by . If party i already exists, then upon this query, all long-term key pairs will be replaced with , and existing randomness and session keys holding by any will be erased. In any case, party i has once this query has been issued. -
: The oracle responds with the long-term private keys of party . If is the -th query issued by , then we say that is -corrupted. For parties that have never been corrupted, we define .
-
: Oracle responds to this query with the contents of variable to . This query models the attacks that the exposure of a session key should not be damaging to other sessions. (Note that we have if and only if .)
-
: Oracle responds with the contents of the ephemeral secret stored in variable .
-
: This query can be made at most once. It does not model attacks but functions as a judgment for whether ’s attacks are successful. Oracle handles this query as follows. If the oracle has state , then it returns a failure symbol ⊥. If the oracle does not have access to the corresponding type of keys, it returns some failure symbol ⊥.
Otherwise, it flips a fair coin b, and it returns , where is the real and .
-
This query judges the result of an attack, the goal of which is to forge a valid key pair. The output is 1 if and 0 otherwise, where is parameterized by concrete protocols.
4.3. Security Definitions
Let ∈ denote the session identifier received by oracle , where , i.e., a set of binary strings of length .
(Partnering Using ). In the protocol execution described above, we say that (with (, , )) and (with (, , )) are partnered if the following hold for both oracles: (1) = j and = i; (2) = accept and = accept; (3) = ;
(Registration Freshness). Let be the -th query. We call an oracle -reg-fresh if all the following conditions hold for the adversary .
(No direct corruption) i is τ-corrupt with .
(No corrupt-and-replace) If and is an honest generated public key, then j is -corrupt with .
(Type 1) If the first is the τ-th query with , then is -corrupt, , where is the KGC,
(Type 2) If is the -th query of with , then has not made any before .
Here, we define the security of the key pair registration protocol.
(Secure Key Pair Registration). Let the KGC be party . We say that a key pair registration protocol Π is -secure, if for all adversaries with running time bounded by t, for some function , it holds that if has issued a -query as the -th query to oracle , every client oracle is -reg-fresh, then the advantage is bounded by a function ϵ. More specifically,
where .(Session Oracle Freshness). Let be an accepting oracle held by a party with intended partner . Meanwhile, let be an oracle (if it exists), such that and are partnered. Then the oracle is said to be -fresh, if it is -reg-fresh, and when the adversary issues its -th query to and NONE of the following conditions holds:
has either made a query or a query, (if exists);
is -corrupted with ;
is -corrupted with , (if exists);
if exists, it is NOT -reg-fresh;
has either made both and queries, or both and (if exists).
(Secure Authenticated Key Exchange). We say that an AKE protocol Π is -secure, if for all adversaries with running time t, for some probability , it holds that: when returns such that has issued a -query as the -th query to oracle , and the client oracle is -fresh and has a synchronized partner throughout the security game, then the advantage is bounded by a function ϵ. More specifically,
where .The model that we have discussed so far provides a unified framework to evaluate the new CL-AKE protocols. The freshness ensures that we are focusing on real threats, and the queries can be combined to emulate attacks such as replay and man-in-the-middle.
5. New Protocols for Certificate-Less Infrastructure
The canonical way to transform a certificate-based AKE to CL-AKE is to replace the signature with a CL-SIG. However, the efficiency of the result is sub-optimal due to redundant computation and the extra demand for randomness. For example, to sign a message with our CL-SIG, an extra randomness is needed for the Schnorr component (line 4 in in Figure 1), and point multiplications are needed for verification.
Our new CL-AKE protocols save the participants from any signature verification. in (Figure 1) ensures that once Alice has a reliable , its peer Bob has to use a correct secret key with respect to and in AKE (Figure 2), leading to optimal performance.
5.1. Client Key Registration
Initially, a client is provisioned with the KGC’s public keys and its own encryption/decryption key pairs. A client can then register its key pair to a KGC, which also knows the client’s encryption key. Details of our new client key pair generation protocol (Protocol 2) can be found in Figure 3. The security is summarized in the following theorem, where for is defined as checking the discrete log relation .
(Security of Protocol 2). Assuming an authenticated channel, if the public encryption scheme is secure and discrete logarithm problem is hard with respect to group , then Protocol 2 is secure in the sense of Definition 10 in the random oracle model. More specifically, for any PPT adversary ,
(2)
where d is the maximal number of parties, ℓ is the maximal number of oracles owned by each party, is the group and the range of the hash function , is the advantage against the hash function , is the advantage against in the game, and is the advantage against .We use a sequence of games [36] to argue ’s advantage against Protocol 2. The term means ’s advantage in .
. This is the original game, so we have
(3)
. We add an abort rule in this game. We abort the game if any collision of honestly generated randomness or any hash collision happens. The abort probability can be bounded by the term . Therefore, we have(4)
Once the collisions have all been eliminated, from Corollary 1 we can have(5)
By combining the (in)equalities (3)–(5), we have (2) in Theorem 2. □
5.2. Certificate-Less Authenticated Key Exchange
The certificate-less authenticated key exchange protocol (CL-AKE) with explicit authentication is presented in Figure 2. The correctness is trivial, and the three non-base point multiplications are for computing (or ) and . Let be a hash function modeled as a random oracle that maps any binary string to an integer in group .
(Security of Protocol 3). If the key pair registration scheme is secure, the problem is hard, and and are secure, then Protocol 3 is secure in the sense of Definition 12 in the random oracle model. More specifically, for any PPT adversary ,
(6)
where d is the maximal number of parties, ℓ the maximal number of oracles owned by each party, is the group for , the advantages against hash functions and , the advantage against the pseudo-random function , the advantage against , and the advantage against the problem.We use another sequence of games to bound ’s advantage against Protocol 3. The term denotes ’s advantage in .
. This is the original game, so we have
(7)
. We add an abort rule in this game. If any collision of honestly generated randomness happens, or any hash collision happens, we abort the game. The abort probability can be bounded by the term , Therefore we have
(8)
. We add an abort rule here. If successfully forges a key pair and uses in the first message in the transportation phase, prior to the corruption of any party, abort the game. This probability is bounded by . Thus, we have
(9)
. We add an abort rule here. Let the challenger first guess ’s target and its peer . If the guess is wrong, abort the game. Thus, we have
(10)
. We replace with a random oracle . Distinguishing from implies the existence of another adversary against the security of . We now have
(11)
. We add an abort rule here. If successfully forges an or in the second or the last message in the transportation phase, prior to the corruption of the target party or its peer, abort the game. This probability is again bounded by . Thus, we have
(12)
We use to mark four (sub-)cases when the freshness of still holds, i.e., ’s attack is non-trivial.
: has never queried both and .
: has never queried both and .
: has never queried both and .
: has never queried both and .
It is straightforward to see that if none of the cases exist in , then ’s attack is trivial. Let denote ’s advantage in when holds. We have from the union bound
(13)
We rewrite the computation of as
(14)
Observe that each of the four products on the right-hand side of (14) corresponds to one of the four fresh cases, and each fresh case allows a different strategy of embedding the . Let and be the game when one of the four cases exist.
. We claim that
(15)
We show how to construct a solver to prove (15). chooses a random value in the key space and program the random oracle with , where and all the variables are from the target session. Let be ’s challenge. sets to , aborts the game when
queries the random oracle with a at the place of any PRF queries,
and where .
In other words, if the game aborts, finds a solution to the instance.
As guarantees that neither nor would be asked by , can generate all other randomness including freely and simulate all the other , and queries perfectly for . The probability of aborting the game is thus upper bounded by .
On the other hand, if simulated by does not abort, then has never queried the random oracle with the correct value to compute the target session key. Due to the property of random oracle, has zero advantage in distinguishing the random key .
. embeds into
(16)
. embeds into , and aborts when where . This abort means a solution of has been found.
(17)
. Similar to the previous case, if embeds into , it can also find a solution when the game aborts.
(18)
Now, we can conclude from the arguments above and (13) that
(19)
By combining the (in)equalities (7)–(19), we have proved (6). □
6. Integration into TLS and Performance Evaluation
Since our solution is already asymptotically better than other provably secure ones (see Table 1), we only demonstrate its performance in real-world scenarios and compare with the original certificate-based TLS (
The two standard ways to integrate the Protocol 3 in Figure 2 are via the certificate type RawPublicKey [37] and via the PSK identities [38] (We merged mTag1 and mTag2 with the finish-messages in the TLS handshake.). When RawPublicKey is chosen, the TLS server sends in the (Server) Certificate message, and the TLS client sends in the (Client) Certificate message. When PSK identities is used, the TLS server sends in the ServerkeyExchange.psk_identity_hint field, and the TLS client sends in the ClientKeyExchange.psk_identity field.
6.1. Set Up
Opting for the PSK identifiers, we insert the encoded , the EC group ID and auxiliary information into it. We implement Protocol 3 with the BouncyCastle library and OpenSSL (
6.2. Results
6.2.1. Computational Cost
Besides using absolute time, we measured the time consumption for the elementary functions with the base-point multiplication as a unit. We consider only the point multiplication, signature signing and verification to be elementary operations. Here, the cost of point addition, arithmetic operations and hash functions are ignored, as they are relatively negligible compared to the above operations.
We use to denote the time for computing one base point multiplication (BPM) and use as a unit.
-
A non-base point multiplication (PM) costs 6 . This difference comes from the optimization of base-point multiplication [39].
-
A signing costs 2.5 and verification 8.5 . This 6 difference comes exactly from the extra non-base point multiplication in the verification. Signing with ECDSA also needs extra operations in the integer group, so it is slower (2.5 ) than a simple base-point multiplication (1 ).
While the TLS with certificates needs , this work needs only , saving at least 28% local computation time for the cryptographic core. Details are provided in Table 4.
6.2.2. Communication Cost
In this part, we compare the communication cost between this work and TLS-DHE. We measure the communicated messages using the tool Wireshark (
6.2.3. Resource Consumption on the Constrained Client
The execution time is 2.09 s for Protocol 3 in the LAN setting (1 Gbps with 0.1 ms latency), saving 70% of the time compared to TLS-DHE with certificates.
Meanwhile, it is 13.8 KB for TLS-DHE, the maximal RAM consumption during key registration and Protocol 3 is 4.09 KB, making a considerable 70% reduction in RAM consumption. Whereas TLS-DHE consumes more than 150 KB, the binary of Protocol 3 consumes 48.32 KB in maximum in flash, i.e., a good reduction of 67% in storage can also be seen.
7. Conclusions and Future Work
Without using bilinear pairings, we construct practical certificate-less signature, key registration, and authenticated key exchange protocols with integration to TLS. To the best of our knowledge, our AKE protocols have the lowest number of point-multiplication among DH-based CL-AKE, while enjoying strong security in the eCK model.
We believe that the construction of practical post-quantum-secure CL-AKE can be pursued as meaningful future work, to design general compilers that can transform CL-SIG with two-way-reconstructable PK to CL-AKE, and to analyze the possible equivalence of game-based and universally composable security formalization [4].
Conceptualization, L.D., Y.L. and L.L.; methodology, L.D., Y.L. and L.L.; software, L.L.; formal analysis, L.D. and Y.L.; data curation, L.L.; writing—original draft preparation, L.D.; writing—review and editing, Y.L. and L.L.; visualization, L.D. and L.L. All authors have read and agreed to the published version of the manuscript.
Data are contained within the article.
The authors declare no conflict of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Figure 1. Construction 1, the pairing-free CL-SIG-TRK construction [Forumla omitted. See PDF.]. Capital letters, such as A, B and T, represent EC group elements (points). Lowercase letters, such as a, b and s, represent integers in [Forumla omitted. See PDF.].
Figure 2. Protocol 3: Three-pass certificate-less AKE with mutual authentication.
Figure 3. Protocol 2, client key pair registration with [Forumla omitted. See PDF.].
Comparison with other provably secure pairing-free (EC)DH-based CL-AKE. Proposals without security models, such as [
# BPM | # PM | Security Model | |
---|---|---|---|
Yang and Tan [ |
1 | 10 | dedicated, game-based, stage-separated |
Song et al. [ |
1 | 7 | dedicated, game-based, stage-separated |
He et al. [ |
1 | 4 | eCK for CL-AKA only |
This work | 1 | 3 | extended eCK for AKE and key reg. |
Queries (adversary’s ability) in the
Query | Description |
---|---|
|
return partial private/public keys |
|
replace the public key of |
|
get the private key of |
|
return |
|
get |
Internal states of oracles.
Variable | Description |
---|---|
|
records the identities |
|
denotes |
|
denotes the session identifiers |
|
records the session key |
|
records the ephemeral secret used to compute the session key |
Computation cost. BPM: base-point scalar multiplication, PM: point scalar multiplication. Columns 2 to 4: number of operations on each side.
BPM (1 |
PM (6 |
Sign (2.5 |
Vrfy (8.5 |
Total | |
---|---|---|---|---|---|
TLS-DHE. | 1 | 1 | 1 | 2 | 26.5 |
Protocol 3 TLS | 1 | 3 | 0 | 0 | 19 |
Communication cost comparison in bytes.
Operation | Data |
Data |
---|---|---|
Client Hello | 309 | 106 |
Server Response |
1092 | 421 |
Client Certificate | 733 | 0 |
Client Key Exchange | 119 | 266 |
Certificate Verify | 128 | 0 |
Change Cipher Spec | 50 | 50 |
Total | ≈2430 | ≈840 ( |
Appendix A. Proof of EUF-CMA Security of
Appendix A.1. Multiple-Forking Lemma
We recall the multiple-forking lemma introduced by Boldyreva et al. [
(Multiple-Forking Lemma, Lemma C.5 in [
Let
Then
This lemma allows forks to happen at two distinct positions I and J. When
Figure A1. The multiple-forking algorithm [Forumla omitted. See PDF.] associated to [Forumla omitted. See PDF.] in Lemma A1. We use [Forumla omitted. See PDF.] in the proof of Lemma A2.
Appendix A.2. Proof of Theorem 1
Here we prove Theorem 1 via proving Lemma A2 and Lemma A3. We use
(
We define the following events in the CL-SIG security experiments against a Type I adversaries
: outputs a forgery , where , has not been replaced, and m has not been queried to the signing oracle . : outputs a forgery , where , and is an adversarial public key for .
It is easy to see that
To bound
chooses random
in the range of , compute . program the random oracle
such that . If
queries for , randomly choose a and compute . If
queries for , randomly choose a .
When
To bound
gets a DLP challenge and a KGC identifier . sets up the KGC public key , the KGC identifier , CL-PKC parameters . also initializes two empty lists and to simulate the random oracles. Another empty list of replaced public keys is initialized by . set up a flag . Preparation of simulated signing keys
for . Choose random
, compute . Choose random
in the range of , compute . If any collision happens, set . Program the random oracle
such that , i.e., set ← .
sends to , chooses some randomness for , and prepares to answer the random oracle queries and others. Answer to
queries, where s has the form . If
is defined, return to . Otherwise, pick up , define , and return H. Answer to
. If
is defined, return to . Otherwise, pick up W , define , and return W. Answer to
If
is not replaced, choose a , compute , record and return to . Otherwise, return ⊥.
Answer to
queries. Record in and return “ ” to . Answer to
. Return if is not replaced, and ⊥ otherwise. Answer to
queries. If
, retrieve the simulated signing key . Choose
, compute , choose . If
is defined, set . Set
, , where , and return to .
Otherwise, return ⊥ to
.
We also count signing queries as
queries. If
submits a forgery , parse as and parse as . searches for , and . If or is not defined, set . If
, set .
If
, then finally outputs . Otherwise outputs .
Variables in the proof.
Variable | Meaning |
---|---|
a list of public keys registered by the adversary | |
a list to simulate the random oracle | |
a list to simulate the random oracle |
We then use the multiple-forking algorithm
Figure A2. The DLP solving algorithm [Forumla omitted. See PDF.] from [Forumla omitted. See PDF.].
We now show that
in the execution of
, outputs a valid forgery , with , . in the execution of
, outputs a valid forgery , with , , , and . in the execution of
, outputs a valid forgery , with , , and . in the execution of
, outputs a valid forgery , with , , , and .
From (1) and (2), we have
Similarly, from (3) and (4), we have
Solving for X in (
Therefore, the output of
Let
Let
By applying (
(
Similar to the previous proof, we define two events such that
: outputs a forgery , where , is the original public key of party , and m has not been queried to the signing oracle . : outputs a forgery , where , and is an adversarial public key for .
If
The Type 2 adversary cannot replace public keys, so we have
We use the advantage
(Security of Schnorr Signature, from Theorem 4.1 in [
By plugging (
References
1. Rescorla, E. Internet Engineering Task Force. The Transport Layer Security (TLS) Protocol Version 1.3. 2018; Available online: https://tools.ietf.org/html/draft-ietf-tls-tls13-26 (accessed on 8 December 2023).
2. Bellare, M.; Rogaway, P. Entity Authentication and Key Distribution. Proceedings of the CRYPTO’93; Santa Barbara, CA, USA, 22–26 August 1994; Volume 773, pp. 232-249. [DOI: https://dx.doi.org/10.1007/3-540-48329-2_21]
3. LaMacchia, B.A.; Lauter, K.; Mityagin, A. Stronger Security of Authenticated Key Exchange. Proceedings of the ProvSec 2007; Wollongong, Australia, 1–2 November 2007; Susilo, W.; Liu, J.K.; Mu, Y. Volume 4784, pp. 1-16.
4. Canetti, R. Universally Composable Security: A New Paradigm for Cryptographic Protocols. Cryptology ePrint Archive, Report 2000/067. 2000; Available online: https://ia.cr/2000/067 (accessed on 8 December 2023).
5. Jager, T.; Kohlar, F.; Schäge, S.; Schwenk, J. On the Security of TLS-DHE in the Standard Model. Proceedings of the CRYPTO 2012; Santa Barbara, CA, USA, 19–23 August 2012; Safavi-Naini, R.; Canetti, R. Volume 7417, pp. 273-293. [DOI: https://dx.doi.org/10.1007/978-3-642-32009-5_17]
6. Kiefer, F.; Manulis, M. Universally composable two-server PAKE. Proceedings of the International Conference on Information Security; Honolulu, HI, USA, 3–6 September 2016; Springer: Cham, Switzerland, 2016; pp. 147-166.
7. Bormann, C.; Ersue, M.; Keranen, A. Terminology for Constrained-Node Networks. RFC 7228 (Informational). 2014; Available online: https://datatracker.ietf.org/doc/html/rfc7228 (accessed on 8 December 2023).
8. Al-Riyami, S.S.; Paterson, K.G. Certificateless public key cryptography. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Taipei, Taiwan, 30 November–4 December 2003; Springer: Cham, Switzerland, 2003; pp. 452-473.
9. Crampton, J.; Lim, H.W.; Paterson, K.G.; Price, G. A certificate-free grid security infrastructure supporting password-based user authentication. Proceedings of the 6th Annual PKI R&D Workshop; Gaithersburg, MD, USA, 17–19 April 2007; pp. 103-118.
10. Taha, S.; Shen, X. A link-layer authentication and key agreement scheme for mobile public hotspots in NEMO based VANET. Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM); Anaheim, CA, USA, 3–7 December 2012; pp. 1004-1009.
11. Memon, I.; Mohammed, M.R.; Akhtar, R.; Memon, H.; Memon, M.H.; Shaikh, R.A. Design and implementation to authentication over a GSM system using certificate-less public key cryptography (CL-PKC). Wirel. Pers. Commun.; 2014; 79, pp. 661-686. [DOI: https://dx.doi.org/10.1007/s11277-014-1879-8]
12. Memon, I.; Hussain, I.; Akhtar, R.; Chen, G. Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme. Wirel. Pers. Commun.; 2015; 84, pp. 1487-1508. [DOI: https://dx.doi.org/10.1007/s11277-015-2699-1]
13. Balakrishnan, S.K.; Raj, V.J. Practical Implementation of a Secure Email System Using Certificateless Cryptography and Domain Name System. Int. J. Netw. Secur.; 2016; 18, pp. 99-107.
14. Bala, D.Q.; Maity, S.; Jena, S.K. A lightweight remote user authentication protocol for smart e-health networking environment. Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC); Palladam, India, 10–11 February 2017; pp. 10-15.
15. Saeed, M.E.S.; Liu, Q.Y.; Tian, G.; Gao, B.; Li, F. Remote authentication schemes for wireless body area networks based on the Internet of Things. IEEE Internet Things J.; 2018; 5, pp. 4926-4944.
16. Song, J.; He, C.; Zhang, L.; Tang, S.; Zhang, H. Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Commun.; 2014; 11, pp. 93-103. [DOI: https://dx.doi.org/10.1109/CC.2014.6969774]
17. Yang, G.; Tan, C.H. Strongly Secure Certificateless Key Exchange without Pairing. Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’11; Hong Kong, China, 22–24 March 2011; pp. 71-79.
18. Farouk, A.; Miri, A.; Fouad, M.M.; Abdelhafez, A.A. Efficient pairing-free, certificateless two-party authenticated key agreement protocol for grid computing. Proceedings of the 2014 Fourth International Conference on Digital Information and Communication Technology and Its Applications (DICTAP); Bangkok, Thailand, 6–8 May 2014; pp. 279-284.
19. He, D.; Padhye, S.; Chen, J. An efficient certificateless two-party authenticated key agreement protocol. Comput. Math. Appl.; 2012; 64, pp. 1914-1926. [DOI: https://dx.doi.org/10.1016/j.camwa.2012.03.044]
20. Safi, Q.G.K.; Luo, S.; Pan, L.; Liu, W.; Yan, G. Secure authentication framework for cloud-based toll payment message dissemination over ubiquitous VANETs. Pervasive Mob. Comput.; 2018; 48, pp. 43-58. [DOI: https://dx.doi.org/10.1016/j.pmcj.2018.05.004]
21. Boneh, D.; Boyen, X. Secure Identity Based Encryption Without Random Oracles. Proceedings of the CRYPTO 2004; Santa Barbara, CA, USA, 15–19 August 2004; Franklin, M. Volume 3152, pp. 443-459. [DOI: https://dx.doi.org/10.1007/978-3-540-28628-8_27]
22. Boneh, D.; Boyen, X.; Goh, E.J. Hierarchical Identity Based Encryption with Constant Size Ciphertext. Proceedings of the EUROCRYPT 2005; Aarhus, Denmark, 22–26 May 2005; Cramer, R. Volume 3494, pp. 440-456. [DOI: https://dx.doi.org/10.1007/11426639_26]
23. Lewko, A.B.; Waters, B. New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques. Proceedings of the CRYPTO 2012; Santa Barbara, CA, USA, 19–23 August 2012; Safavi-Naini, R.; Canetti, R. Volume 7417, pp. 180-198. [DOI: https://dx.doi.org/10.1007/978-3-642-32009-5_12]
24. Debiao, H.; Jianhua, C.; Jin, H. An ID-based client authentication with key agreement protocol for mobile client–server environment on ECC with provable security. Inf. Fusion; 2012; 13, pp. 223-230. [DOI: https://dx.doi.org/10.1016/j.inffus.2011.01.001]
25. Yao, X.; Kong, H.; Liu, H.; Qiu, T.; Ning, H. An attribute credential based public key scheme for fog computing in digital manufacturing. IEEE Trans. Ind. Inform.; 2019; 15, pp. 2297-2307. [DOI: https://dx.doi.org/10.1109/TII.2019.2891079]
26. Galindo, D.; Morillo, P.; Ràfols, C. Breaking Yum and Lee generic constructions of certificate-less and certificate-based encryption schemes. Proceedings of the European Public Key Infrastructure Workshop; Turin, Italy, 19–20 June 2006; Springer: Cham, Switzerland, 2006; pp. 81-91.
27. Maity, S.; Hansdah, R.C. Certificate-less On-demand public key management (CLPKM) for self-organized MANETs. Proceedings of the International Conference on Information Systems Security; Guwahati, India, 15–19 December 2012; Springer: Cham, Switzerland, 2012; pp. 277-293.
28. Banerjee, U.; Chandrakasan, A.P. Efficient post-quantum TLS handshakes using identity-based key exchange from lattices. Proceedings of the ICC 2020—2020 IEEE International Conference on Communications (ICC); Virtual, 7–11 June 2020; pp. 1-6.
29. Li, H.; Wang, Y.; Fu, X.; Lan, C.; Wang, C.; Li, F.; Guo, H. PSCPAC: Post-quantum secure certificateless public auditing scheme in cloud storage. J. Inf. Secur. Appl.; 2021; 61, 102927. [DOI: https://dx.doi.org/10.1016/j.jisa.2021.102927]
30. Wei, G.; Fan, K.; Zhang, K.; Wang, H.; Li, H.; Yang, Y. Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things. IEEE Internet Things J.; 2023; Available online: https://ieeexplore.ieee.org/abstract/document/10285342 (accessed on 8 December 2023). [DOI: https://dx.doi.org/10.1109/JIOT.2023.3323275]
31. Li, L.; Xu, M. PVCLS-SI: Isogeny-based Certificateless Signature Scheme. Proceedings of the 2022 IEEE 10th International Conference on Information, Communication and Networks (ICICN); Zhangye, China, 19–22 August 2022; pp. 632-637.
32. Kumari, S.; Singh, M.; Singh, R.; Tewari, H. A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices. Comput. Netw.; 2022; 217, 109327. [DOI: https://dx.doi.org/10.1016/j.comnet.2022.109327]
33. Seyhan, K.; Nguyen, T.N.; Akleylek, S.; Cengiz, K. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: A survey. Clust. Comput.; 2022; 25, pp. 1729-1748. [DOI: https://dx.doi.org/10.1007/s10586-021-03380-7]
34. Katz, J.; Lindell, Y. Introduction to Modern Cryptography; CRC Press: Boca Raton, FL, USA, 2014.
35. Boldyreva, A.; Palacio, A.; Warinschi, B. Secure proxy signature schemes for delegation of signing rights. J. Cryptol.; 2012; 25, pp. 57-115. [DOI: https://dx.doi.org/10.1007/s00145-010-9082-x]
36. Shoup, V. Sequences of Games: A Tool for Taming Complexity in Security Proofs. Cryptology Eprint Archive. 2004; Available online: https://eprint.iacr.org/2004/332 (accessed on 8 December 2023).
37. Wouters, P.; Tschofenig, H.; Gilmore, J.; Weiler, S.; Kivinen, T. Using Raw Public Keys in Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS). RFC 7250 (Proposed Standard). 2014; Available online: https://datatracker.ietf.org/doc/html/rfc7250 (accessed on 8 December 2023).
38. Eronen, P.; Tschofenig, H. Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). RFC 4279 (Standards Track). 2005; Available online: https://datatracker.ietf.org/doc/html/rfc4279 (accessed on 8 December 2023).
39. Dimitrov, V.; Imbert, L.; Mishra, P.K. Efficient and secure elliptic curve point multiplication using double-base chains. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security; Chennai, India, 4–8 December 2005; pp. 59-78.
40. Bellare, M.; Neven, G. Multi-signatures in the plain public-Key model and a general forking lemma. Proceedings of the ACM CCS 2006; Alexandria, VA, USA, 30 October–3 November 2006; Juels, A.; Wright, R.N.; De Capitani di Vimercati, S. pp. 390-399. [DOI: https://dx.doi.org/10.1145/1180405.1180453]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
We propose highly efficient certificate-less (CL) protocols for the infrastructure used by authenticated key exchange (AKE). The construction is based on elliptic curves (EC) without pairing, which means it can be easily supported by most industrial cryptography libraries on constrained devices. Compared with other pairing-free CL solutions, the new CL-AKE protocol enjoys the least number of scalar multiplications over EC groups. We use a unified game-based model to formalize the security of each protocol, while most previous works only assess the security against a list of attacks, provide informal theorems without proper modeling, or use separate models for protocols in different stages. We also present an efficient integration of the core protocols into the TLS cipher suites and a stand-alone implementation for constrained devices. The performance is evaluated on constrained devices in real-world settings, which further confirms the efficiency of our proposal.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details

1 Huawei Technologies Düsseldorf, 8600 Düsseldorf, Germany;
2 Huawei Technologies Düsseldorf, 8600 Düsseldorf, Germany;