An improved identity-based key agreement protocol and its security proof

Shengbao Wang, Zhenfu Cao*, Kim Kwang Raymond Choo, Lihua Wang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

61 Scopus citations

Abstract

We revisit the identity-based (ID-based) key agreement protocol due to Ryu et al. The protocol is highly efficient and suitable for real-world applications despite offering no resilience against key-compromise impersonation (K-CI). We show that the protocol is also insecure against reflection attacks. We propose a slight modification to the protocol and prove its security in a widely accepted model.

Original languageEnglish
Pages (from-to)307-318
Number of pages12
JournalInformation Sciences
Volume179
Issue number3
DOIs
StatePublished - 16 Jan 2009
Externally publishedYes

Keywords

  • Key agreement protocols
  • Modular proof
  • PKG forward secrecy
  • Provable security
  • Reflection attack

Fingerprint

Dive into the research topics of 'An improved identity-based key agreement protocol and its security proof'. Together they form a unique fingerprint.

Cite this