Cryptanalysis and improvement of choie et al.'s authenticated key agreement protocols

  • Shengbao Wang
  • , Zhenfu Cao*
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Security and efficiency are the main concerns when designing an authenticated key agreement protocol. In 2005, Choie et al. proposed two identity-based authenticated key agreement protocols based on bilinear pairings. In this paper, however, we point out that both their two protocols are of certain security or efficiency problems. For their first protocol, we show that it is vulnerable to a signature forgery attack which undermines its key integrity and then suggest a simple method to solve the problem. As for their second protocol, we discover much computational redundancy and then put forward a more efficient modified protocol which discards the unnecessary computations.

Original languageEnglish
Title of host publication2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
PublisherIEEE Computer Society
Pages1371-1374
Number of pages4
ISBN (Print)1424406056, 9781424406050
DOIs
StatePublished - 2006
Externally publishedYes
Event2006 International Conference on Computational Intelligence and Security, ICCIAS 2006 - Guangzhou, China
Duration: 3 Oct 20066 Oct 2006

Publication series

Name2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
Volume2

Conference

Conference2006 International Conference on Computational Intelligence and Security, ICCIAS 2006
Country/TerritoryChina
CityGuangzhou
Period3/10/066/10/06

Fingerprint

Dive into the research topics of 'Cryptanalysis and improvement of choie et al.'s authenticated key agreement protocols'. Together they form a unique fingerprint.

Cite this