Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment

被引:0
|
作者
Kim, S [1 ]
Lee, H [1 ]
Oh, H [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
ID-based cryptosystem; key agreement protocol; multiple PKG environment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2005, Lee et al. proposed an ID-based 2-party key agreement protocol between users whose private keys were issued by independent PKGs that do not share any system parameters. This work was the first kind that assumes completely independent multiple PKG environment. However, Lee et al. protocol has a flaw that allows attackers to impersonate others without knowing their private keys. In this paper, we propose a modification to the protocol of Lee et al. that prevents impersonation attacks. We also show a simple technique that can improve the efficiency of tripartite key agreement protocol of Lee et al. We also provide analysis of the security and efficiency of the proposed protocols.
引用
收藏
页码:323 / 335
页数:13
相关论文
共 50 条
  • [1] An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
    Tan, Zuowen
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 21 - 28
  • [2] Efficient ID-based authenticated key agreement
    Jin Lijie
    Xu Chunxiang
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
  • [3] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia S.
    Quan J.-X.
    Han W.-B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [4] ID-Based Authenticated Dynamic Group Key Agreement
    王莺洁
    潘军
    诸鸿文
    JournalofShanghaiJiaotongUniversity, 2005, (03) : 236 - 241
  • [5] Certificateless-based two-party authenticated Key agreement Protocols in a Multiple PKG Environment
    Pan Jin
    Liu Xiaoqiong
    Xie Minghui
    Liu Qiong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2364 - 2367
  • [6] ID-based authenticated multiple-key agreement protocol from pairings
    Kim, KW
    Ryu, EK
    Yoo, KY
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 4, 2004, 3046 : 672 - 680
  • [7] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    Journal of Shanghai Jiaotong University, 2007, (02) : 247 - 249
  • [8] ID-based multi-party authenticated key agreement protocols using multilinear forms
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
    Tien Tzu Hsueh Pao, 2008, 10 (1869-1872+1890):
  • [9] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [10] Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper)
    Shim, Kyung-Ah
    Seo, Seung-Hyun
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 410 - +