Security analysis on tripartite authenticated key agreement protocols

被引:0
|
作者
Li Hao [1 ]
Dai Jufeng [1 ]
Gao Junping [2 ]
机构
[1] Tianjin Univ, Sch Elect Informat Engn, Tianjin 300072, Peoples R China
[2] Hebei Univ Technol, Sch Informat Engn, Tianjin 30042, Peoples R China
关键词
Passive attack; Tripartite key agreement; Bilinear pairings;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Nalla and Reddy proposes ID-based tripartite authenticated key agreement protocols from Well pairing. Security analysis on passive attack for Nalla-Reddy's ID-AK-2 and ID-AK-3 protocols Is proposed in this paper and the protocols are proved to be not secure on passive attack.
引用
收藏
页码:4653 / +
页数:2
相关论文
共 50 条
  • [1] Tripartite authenticated key agreement protocols from pairings
    Al-Riyami, SS
    Paterson, KG
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359
  • [2] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. 14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [3] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [4] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [5] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [6] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    [J]. ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [7] Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
    Shim, Kyung-Ah
    Woo, Sung Sik
    [J]. INFORMATION SCIENCES, 2007, 177 (04) : 1143 - 1151
  • [8] Comparative study of tripartite identity-based authenticated key agreement protocols
    Hölbl, Marko
    Welzer, Tatjana
    Brumen, Boštjan
    [J]. Informatica (Ljubljana), 2009, 33 (03) : 347 - 355
  • [9] Comparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols
    Holbl, Marko
    Welzer, Tatjana
    Brumen, Bostjan
    [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2009, 33 (03): : 347 - 355
  • [10] Security properties of two authenticated conference key agreement protocols
    Tang, Q
    Mitchell, CJ
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 304 - 314