Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment

被引:0
|
作者
Kim, S [1 ]
Lee, H [1 ]
Oh, H [1 ]
机构
[1] Hanyang Univ, Dept Comp Sci & Engn, Seoul, South Korea
关键词
ID-based cryptosystem; key agreement protocol; multiple PKG environment;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In 2005, Lee et al. proposed an ID-based 2-party key agreement protocol between users whose private keys were issued by independent PKGs that do not share any system parameters. This work was the first kind that assumes completely independent multiple PKG environment. However, Lee et al. protocol has a flaw that allows attackers to impersonate others without knowing their private keys. In this paper, we propose a modification to the protocol of Lee et al. that prevents impersonation attacks. We also show a simple technique that can improve the efficiency of tripartite key agreement protocol of Lee et al. We also provide analysis of the security and efficiency of the proposed protocols.
引用
收藏
页码:323 / 335
页数:13
相关论文
共 50 条
  • [31] A New ID-Based Authenticated Key Agreement Between Members Of Distinct Domains
    Xia, Song
    You, Juan
    Han, Wenbao
    Wang, Lei
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 195 - 199
  • [32] ID-based authenticated group key agreement secure against insider attacks
    Choi, Kyu Young
    Hwang, Jung Yeon
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (07) : 1828 - 1830
  • [33] An ID-Based Authenticated Key Agreement Protocol for Peer-to-Peer Computing
    陆荣幸
    曹珍富
    苏仁旺
    柴震川
    JournalofShanghaiJiaotongUniversity(Science), 2006, (02) : 205 - 209
  • [34] ID-based authenticated key agreement for low-power mobile devices
    Choi, KY
    Hwang, JY
    Lee, DH
    Seo, IS
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 494 - 505
  • [35] Security of an efficient ID-based authenticated key agreement protocol from pairings
    Wang, SB
    Cao, ZF
    Bao, HY
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 342 - 349
  • [36] Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings
    Shim, K
    Woo, S
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (03) : 523 - 530
  • [37] Two provable secure ID-based group Key agreement protocols
    Miao, Fang
    Liang, Jun
    Yoo, Hyeong Seon
    Wei, Wei
    Journal of Computational Information Systems, 2007, 3 (05): : 1887 - 1892
  • [38] Efficient Provably-Secure Dynamic ID-Based Authenticated Key Agreement Scheme With Enhanced Security Provision
    Abbasinezhad-Mood, Dariush
    Mazinani, Sayyed Majid
    Nikooghadam, Morteza
    Ostad-Sharif, Arezou
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 1227 - 1238
  • [39] Attack on an ID-based authenticated group key agreement scheme from PKC 2004
    Zhang, FG
    Chen, XF
    INFORMATION PROCESSING LETTERS, 2004, 91 (04) : 191 - 193
  • [40] Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2638 - 2640