An attack on the identity-based key agreement protocols in multiple PKG environment

被引:3
|
作者
Oh, J [1 ]
Moon, S
Ma, JF
机构
[1] Korea Financial Telecommun & Clearing Inst, Seoul 135758, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taejon 702701, South Korea
[3] Tianjin Univ, Sch Comp & Automatizat, Tianjin 300160, Peoples R China
关键词
identity-based cryptosystem; key agreement protocol; bilinear map; multiple PKG; implicit key authentication;
D O I
10.1093/ietfec/e89-a.3.826
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lee et al. recently proposed the first identity-based key agreement protocols for a multiple PKG environment where each PKG has different domain parameters in ICCSA 2005. However, this letter demonstrates that Lee et al.'s scheme does not include the property of implicit key authentication which is the fundamental security requirement, making it vulnerable to an impersonation attack.
引用
收藏
页码:826 / 829
页数:4
相关论文
共 50 条
  • [1] Identity-based key agreement protocols in a multiple PKG environment
    Lee, H
    Kim, D
    Kim, S
    Oh, H
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 877 - 886
  • [2] Provably secure identity-based authenticated key agreement protocols in multiple PKG environment
    Xia S.
    Quan J.-X.
    Han W.-B.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2010, 32 (10): : 2393 - 2399
  • [3] An Efficient Identity-Based Key Agreement Protocol in a Multiple PKG Environment
    ZHOU Huan
    WANG Xiaofeng
    SU Jinshu
    Wuhan University Journal of Natural Sciences, 2014, 19 (05) : 455 - 460
  • [4] Identity Based Group Key Agreement in Multiple PKG Environment
    WANG Liming~ 1
    2. Graduate University of Chinese Academy of Sciences
    WuhanUniversityJournalofNaturalSciences, 2006, (06) : 1605 - 1608
  • [5] Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security
    Tan, Zuowen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (08): : 1982 - 1997
  • [6] Identity-based key agreement protocols from pairings
    Chen, L.
    Cheng, Z.
    Smart, N. P.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2007, 6 (04) : 213 - 241
  • [7] Identity-based key agreement protocols from pairings
    L. Chen
    Z. Cheng
    N. P. Smart
    International Journal of Information Security, 2007, 6 : 213 - 241
  • [8] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [9] Strongly secure identity-based authenticated key agreement protocols
    Ni, Liang
    Chen, Gongliang
    Li, Jianhua
    Hao, Yanyan
    COMPUTERS & ELECTRICAL ENGINEERING, 2011, 37 (02) : 205 - 217
  • [10] Identity-based authenticated key agreement protocols in the standard model
    Ren, Yongjun
    Wang, Jiandong
    Wang, Jian
    Xu, Dazhuan
    Zhuang, Yi
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1604 - 1610