Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment

被引:0
|
作者
Kim, S [1 ]
Lee, H [1 ]
Oh, H [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
ID-based cryptosystem; key agreement protocol; multiple PKG environment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2005, Lee et al. proposed an ID-based 2-party key agreement protocol between users whose private keys were issued by independent PKGs that do not share any system parameters. This work was the first kind that assumes completely independent multiple PKG environment. However, Lee et al. protocol has a flaw that allows attackers to impersonate others without knowing their private keys. In this paper, we propose a modification to the protocol of Lee et al. that prevents impersonation attacks. We also show a simple technique that can improve the efficiency of tripartite key agreement protocol of Lee et al. We also provide analysis of the security and efficiency of the proposed protocols.
引用
收藏
页码:323 / 335
页数:13
相关论文
共 50 条
  • [21] An ID-based authenticated dynamic group key agreement with optimal round
    JiKai Teng
    ChuanKun Wu
    ChunMing Tang
    Science China Information Sciences, 2012, 55 : 2542 - 2554
  • [22] An efficient ID-Based authenticated key agreement protocol from pairings
    Ryu, EK
    Yoon, EJ
    Yoo, KY
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1458 - 1463
  • [23] An attack on the identity-based key agreement protocols in multiple PKG environment
    Oh, J
    Moon, S
    Ma, JF
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2006, E89A (03) : 826 - 829
  • [24] ID-based authenticated group key agreement from bilinear maps
    Lv, Xixiang
    Li, Hui
    FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (02): : 302 - 307
  • [25] Efficient ID-based authenticated key agreement protocol based on Weil pairing
    Shim, K
    ELECTRONICS LETTERS, 2003, 39 (08) : 653 - 654
  • [26] A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow
    Hou, Mengbo
    Xu, Qiuliang
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 487 - 490
  • [27] Efficient ID-Based One Round Authenticated Group Key Agreement Protocol
    Shi, Yijuan
    Chen, Gongliang
    Li, Jianhua
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 167 - 170
  • [28] Efficient ID-based Two Round Authenticated Group Key Agreement Protocol
    Tang Hong
    Zhu Liehuang
    Zhang Zijian
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4924 - 4927
  • [29] Efficient ID-based authenticated group key agreement from bilinear pairings
    Zhou, Lan
    Susilo, Willy
    Mu, Yi
    MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 521 - +
  • [30] Round-optimal ID-based dynamic authenticated group key agreement
    Li F.
    Xie D.
    Yan J.
    Gao W.
    Wang X.A.
    International Journal of High Performance Systems Architecture, 2016, 6 (03) : 153 - 161