A New Efficient ID-Based Authenticated Key Agreement Protocol.

作者: Quan Yuan , Songping Li

DOI:

关键词: Protocol (object-oriented programming)AuthenticationComputer scienceKey (cryptography)Computer networkAuthenticated key agreement protocolOakley protocol

摘要: Recently Eun-Kyung Ryu, Eun-Jun Yoon, and Kee-Young Yoo proposed an efficient ID-based authenticated key agreement with paring[11]. They argued that it is secure efficient. In this paper, we show protocol doesn’t satisfy the Key-Compromise Impersonate property not against reveal attack. Then propose our from shim’s protocol[15], its security efficiency was analyzed.

参考文章(11)
M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena, A Survey on ID-Based Cryptographic Primitives. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 94- ,(2005)
Hung-Min Sun, Bin-Tsan Hsieh, Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings. IACR Cryptology ePrint Archive. ,vol. 2003, pp. 113- ,(2003)
Simon Blake-Wilson, Don Johnson, Alfred Menezes, Key Agreement Protocols and Their Security Analysis Lecture Notes in Computer Science. pp. 30- 45 ,(1997) , 10.1007/BFB0024447
Mihir Bellare, Phillip Rogaway, Entity authentication and key distribution international cryptology conference. pp. 232- 249 ,(1993) , 10.1007/3-540-48329-2_21
Young Ju Choie, Eunkyung Jeong, Eunjeong Lee, Efficient identity-based authenticated key agreement protocol from pairings Applied Mathematics and Computation. ,vol. 162, pp. 179- 188 ,(2005) , 10.1016/J.AMC.2003.12.092
C.J. Mitchell, M. Ward, P. Wilson, Key control in key agreement protocols Electronics Letters. ,vol. 34, pp. 980- 981 ,(1998) , 10.1049/EL:19980686
Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing. ,vol. 32, pp. 586- 615 ,(2003) , 10.1137/S0097539701398521
N.P. Smart, Identity-based authenticated key agreement protocol based on Weil pairing Electronics Letters. ,vol. 38, pp. 630- 632 ,(2002) , 10.1049/EL:20020387
Whitfield Diffie, Martin E Hellman, None, New Directions in Cryptography IEEE Transactions on Information Theory. ,vol. 22, pp. 644- 654 ,(1976) , 10.1109/TIT.1976.1055638
Paulo S. L. M. Barreto, Noel McCullagh, A New Two-Party Identity-Based Authenticated Key Agreement. IACR Cryptology ePrint Archive. ,vol. 2004, pp. 122- ,(2004)