Logo Goletty

Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings
Journal Title Journal of Networks
Journal Abbreviation jnw
Publisher Group Academy Publisher
Website http://ojs.academypublisher.com
PDF (807 kb)
   
Title Cryptanalysis on Identity-based Authenticated Key Agreement Protocols from Pairings
Authors Jiang, Han; Xu, Qiuliang; Hou, Mengbo; Guo, Shanqing
Abstract Two-party authenticated key agreement protocol is used to authenticate entities and establish session keys in an open network in order to provide secure communications between two parties. Several security attributes are highly desired for such protocols, such as perfect forward secrecy (the corruption of long-term keys of all the entities should not compromise any session key), PKG forward secrecy (the corruption of the PKGs master key in the ID-based system should not compromise the established session keys), and known session-key specific temporary information secrecy (The exposure of private temporary information should not compromise the secrecy of generated session keys). In 2005, Choie et al. proposed three identity-based authenticated key agreement protocols from pairings. Our analysis shows that they all didnt provide protection against known session-key specific temporary information attack and some of them are vulnerable against man-in-the-middle attack, such as the key replicating attack. We analyze some of the attacks under the BR93 security model.
Publisher ACADEMY PUBLISHER
Date 2010-07-01
Source Journal of Networks Vol 5, No 7 (2010): Special Issue: Recent Advances in Communications and Networking Technologies
Rights Copyright © ACADEMY PUBLISHER - All Rights Reserved.To request permission, please check out URL: http://www.academypublisher.com/copyrightpermission.html. 

 

See other article in the same Issue


Goletty © 2024