An attack on the identity-based key agreement protocols in multiple PKG environment

被引:3
|
作者
Oh, J [1 ]
Moon, S
Ma, JF
机构
[1] Korea Financial Telecommun & Clearing Inst, Seoul 135758, South Korea
[2] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taejon 702701, South Korea
[3] Tianjin Univ, Sch Comp & Automatizat, Tianjin 300160, Peoples R China
关键词
identity-based cryptosystem; key agreement protocol; bilinear map; multiple PKG; implicit key authentication;
D O I
10.1093/ietfec/e89-a.3.826
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lee et al. recently proposed the first identity-based key agreement protocols for a multiple PKG environment where each PKG has different domain parameters in ICCSA 2005. However, this letter demonstrates that Lee et al.'s scheme does not include the property of implicit key authentication which is the fundamental security requirement, making it vulnerable to an impersonation attack.
引用
收藏
页码:826 / 829
页数:4
相关论文
共 50 条
  • [31] Post-quantum identity-based authenticated multiple key agreement protocol
    Yang, Yang
    Yuan, Hongji
    Yan, Linbo
    Ruan, Yinglan
    ETRI JOURNAL, 2023, 45 (06) : 1090 - 1102
  • [32] An Identity-Based Key Agreement Protocol for the Network Layer
    Schridde, Christian
    Smith, Matthew
    Freisleben, Bernd
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 409 - 422
  • [33] An Efficient Identity-Based Group Key Agreement Protocol
    Ping, Zeng
    Yong, Fang
    Yue, Liu
    Hu Ronglei
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2821 - 2825
  • [34] Analysis and improvement of identity-based authenticated key agreement
    Liu, Zhen-Hua
    Hu, Yu-Pu
    Mu, Ning-Bo
    Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (10): : 1194 - 1198
  • [35] Efficient identity-based and authenticated key agreement protocol
    Wang, Yongge
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2013, 7420 : 172 - 197
  • [36] Implementing Identity-based Key Agreement in Embedded Devices
    Schmid, Giovanni
    Rossi, Francesco
    PECCS 2015 PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON PERVASIVE AND EMBEDDED COMPUTING AND COMMUNICATION SYSTEMS, 2015, : 117 - 123
  • [37] Identity-based authenticated asymmetric group key agreement
    Tan, Yu'an, 1727, Science Press (51):
  • [38] Identity-based key exchange protocols without Pairings
    Fiore D.
    Gennaro R.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2010, 6340 (PART 1): : 42 - 77
  • [39] Identity-based key agreement with unilateral identity privacy using pairings
    Cheng, Zhaohui
    Chen, Liqun
    Comley, Richard
    Tang, Qiang
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2006, 3903 : 202 - 213
  • [40] Two proposed identity-based three-party authenticated key agreement protocols from pairings
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    COMPUTERS & SECURITY, 2010, 29 (02) : 244 - 252