Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol

被引:0
|
作者
Lim, Meng-Hui [1 ]
Lee, Sanggon [2 ]
Moon, Sangjae [3 ]
机构
[1] Dongseo Univ, Grad Sch Design & IT, Dept Ubiquitous IT, Pusan 617716, South Korea
[2] Dongseo Univ, Div Internet Engn, Pusan 617716, South Korea
[3] Kyungpook Natl Univ, Sch Elect Engn & Comp Sci, Taegu 702701, South Korea
来源
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to preserve confidentiality and data integrity. Since Joux [6] initiates the development of tripartite key agreement protocol, many prominent tripartite schemes have been proposed subsequently. In 2005, Tso et al. [15] have proposed an ID-based non-interactive tripartite key agreement scheme with k-resilience. Based on this scheme, they have further proposed another one-round tripartite application scheme. Although they claimed that both schemes are efficient and secure, we discover that both schemes are in fact breakable. In this paper, we impose several impersonation attacks on Tso et al.'s schemes in order to highlight their flaws. Subsequently, we propose some applicable enhancements which will not only conquer their defects, but also preserve the security attributes of an ideal key agreement protocol.
引用
收藏
页码:64 / +
页数:3
相关论文
共 50 条
  • [31] An Efficient ID-Based Authenticated Key Exchange Protocol
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Jianhui
    [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 229 - +
  • [32] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. 14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [33] Improvement on Sui et al.'s Separable and Anonymous Key Issuing Protocol in ID-based Cryptosystem
    Wang, Changji
    Li, Qin
    Yang, Xingfeng
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (5B): : 161 - 165
  • [34] Two-pass ID-based authenticated key agreement protocol with key confirmation using pairings
    Wang, Shengbao
    Cao, Zhenfu
    Bao, Haiyong
    [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 109 - +
  • [35] A provable secure ID-based explicit authenticated key agreement protocol without random oracles
    Tian, Hai-Bo
    Susilo, Willy
    Ming, Yang
    Wang, Yu-Min
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2008, 23 (05) : 832 - 842
  • [36] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    田海博
    Willy Susilo
    明洋
    王育民
    [J]. Journal of Computer Science & Technology, 2008, (05) : 832 - 842
  • [37] A round-optimal three-party ID-based authenticated key agreement protocol
    Shim, Kyung-Ah
    [J]. INFORMATION SCIENCES, 2012, 186 (01) : 239 - 248
  • [38] A Provable Secure ID-Based Explicit Authenticated Key Agreement Protocol Without Random Oracles
    Hai-Bo Tian
    Willy Susilo
    Yang Ming
    Yu-Min Wang
    [J]. Journal of Computer Science and Technology, 2008, 23 : 832 - 842
  • [39] An ID-based non-interactive tripartite key agreement protocol with K-resilience
    Tso, R
    Okamoto, T
    Takagi, T
    Okamoto, E
    [J]. PROCEEDINGS OF THE THIRD IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND COMPUTER NETWORKS, 2005, : 38 - 42
  • [40] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme
    Selvi, S. Sharmila Deva
    Vivek, S. Sree
    Gopalakrishnan, Ragavendran
    Karuturi, Naga Naresh
    Rangan, C. Pandu
    [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129