Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol

被引:0
|
作者
Lim, Meng-Hui [1 ]
Lee, Sanggon [2 ]
Moon, Sangjae [3 ]
机构
[1] Dongseo Univ, Grad Sch Design & IT, Dept Ubiquitous IT, Pusan 617716, South Korea
[2] Dongseo Univ, Div Internet Engn, Pusan 617716, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to preserve confidentiality and data integrity. Since Joux [6] initiates the development of tripartite key agreement protocol, many prominent tripartite schemes have been proposed subsequently. In 2005, Tso et al. [15] have proposed an ID-based non-interactive tripartite key agreement scheme with k-resilience. Based on this scheme, they have further proposed another one-round tripartite application scheme. Although they claimed that both schemes are efficient and secure, we discover that both schemes are in fact breakable. In this paper, we impose several impersonation attacks on Tso et al.'s schemes in order to highlight their flaws. Subsequently, we propose some applicable enhancements which will not only conquer their defects, but also preserve the security attributes of an ideal key agreement protocol.
引用
收藏
页码:64 / +
页数:3
相关论文
共 50 条
  • [1] Cryptanalytic flaws in Oh et al.'s ID-based authenticated key agreement protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 458 - +
  • [2] ID-based tripartite key agreement protocol with pairings
    Liu, SG
    Zhang, FG
    Chen, KF
    [J]. 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 136 - 136
  • [3] Cryptanalysis of Lee et al.'s authenticated group key agreement
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    [J]. CEIS 2011, 2011, 15
  • [4] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol
    Lim, Meng-Hui
    Lee, Sanggon
    Lee, Hoonjae
    [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
  • [5] ID-based Key-insulated Authenticated Key Agreement Protocol
    周渊
    程晓明
    柴震川
    [J]. Journal of Shanghai Jiaotong University(Science), 2007, (02) : 247 - 249
  • [6] An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
    Tan, Zuowen
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (01): : 21 - 28
  • [7] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [8] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    [J]. PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084
  • [9] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    [J]. Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
  • [10] Cryptanalysis and improvement of Choie et al.'s authenticated key agreement protocols
    Wang, Shengbao
    Cao, Zhenfu
    [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1371 - 1374