Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings.

作者: Hung-Min Sun , Bin-Tsan Hsieh

DOI:

关键词: Key (cryptography)AuthenticationForward secrecySecurity analysisComputer securityProtocol (science)Shim (computing)Weil pairingComputer science

摘要: Recently, Shim proposed a tripartite authenticated key agreement protocol from Weil pairing to overcome the security flaw in Joux’s protocol. Later, also an ID-based which is improvement of Smart’s order provide forward secrecy. In this paper, we show that these two protocols are insecure against key-compromise impersonation attack and manin-the-middle respectively.

参考文章(7)
Antoine Joux, A One Round Protocol for Tripartite Diffie-Hellman algorithmic number theory symposium. ,vol. 1838, pp. 385- 394 ,(2000) , 10.1007/10722028_23
Paulo SLM Barreto, Hae Y Kim, Ben Lynn, Michael Scott, None, Efficient Algorithms for Pairing-Based Cryptosystems Advances in Cryptology — CRYPTO 2002. pp. 354- 369 ,(2002) , 10.1007/3-540-45708-9_23
Simon Blake-Wilson, Alfred Menezes, Authenticated Diffie-Hellman Key Agreement Protocols selected areas in cryptography. pp. 339- 361 ,(1998) , 10.1007/3-540-48892-8_26
Kyungah Shim, Efficient ID-based authenticated key agreement protocol based on Weil pairing Electronics Letters. ,vol. 39, pp. 653- 654 ,(2003) , 10.1049/EL:20030448
N.P. Smart, Identity-based authenticated key agreement protocol based on Weil pairing Electronics Letters. ,vol. 38, pp. 630- 632 ,(2002) , 10.1049/EL:20020387
Dan Boneh, Matt Franklin, Identity-Based Encryption from the Weil Pairing international cryptology conference. pp. 213- 229 ,(2001) , 10.1007/3-540-44647-8_13