An Enhanced ID-based Authenticated Multiple Key Agreement Protocol

被引:2
|
作者
Tan, Zuowen [1 ]
机构
[1] Jiangxi Univ Finance & Econ, Dept Comp Sci, Sch Informat Technol, Nanchang 330032, Jiangxi, Peoples R China
来源
INFORMATION TECHNOLOGY AND CONTROL | 2013年 / 42卷 / 01期
基金
中国国家自然科学基金;
关键词
Multiple key agreement; Pairing; Identity; Ephemeral key; EXCHANGE; IDENTITY; SCHEME;
D O I
10.5755/j01.itc.42.1.1381
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated multiple key agreement protocols provide secure communication between the participants via multiple session keys within one run of the protocol in an authentic way. Recently, Dehkordi and Alimoradi proposed an identity-based authenticated multiple key agreement protocol. Subsequently, Cheng presented ephemeral key compromise attack and impersonation attack against Dehkordi and Alimoradi's protocol. In order to overcome their security flaws, Cheng proposed an improvement on Dehkordi and Alimoradi's identity-based authenticated multiple key agreement protocol. In this paper, we demonstrate that Cheng's protocol is also insecure. Then we propose an identity-based multiple key agreement protocol which removes their weaknesses of the two protocols. A detailed analysis demonstrates that the proposed protocol can satisfy the strong security requirements.
引用
收藏
页码:21 / 28
页数:8
相关论文
共 50 条
  • [1] ID-based authenticated multiple-key agreement protocol from pairings
    Kim, KW
    Ryu, EK
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 672 - 680
  • [2] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    Journal of Shanghai Jiaotong University, 2007, (02) : 247 - 249
  • [3] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [4] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [5] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
  • [6] Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment
    Kim, S
    Lee, H
    Oh, H
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 323 - 335
  • [7] An ID-Based Authenticated Key Agreement Protocol for Wireless Sensor Networks
    Li-Ping Z.
    Yi W.
    Journal of Communications, 2010, 5 (08): : 620 - 626
  • [8] An efficient ID-Based authenticated key agreement protocol from pairings
    Ryu, EK
    Yoon, EJ
    Yoo, KY
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1458 - 1463
  • [9] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [10] Efficient ID-based authenticated key agreement protocol based on Weil pairing
    Shim, K
    ELECTRONICS LETTERS, 2003, 39 (08) : 653 - 654