Security of an efficient ID-based authenticated key agreement protocol from pairings

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Scopus citations

Abstract

Authenticated key agreement protocols are essential for secure communications in open and distributed environments. In 2004, Ryu et al. proposed an efficient two-party identity-based authenticated key agreement protocol based on pairings. However, in this paper, we demonstrate that their protocol is vulnerable to a key-compromise impersonation attack. The attacking scenario is described in details. Purthermore,we point out that their protocol provides the property of deniability and at the same time it is the mechanism used to achieve deniability that allows the key-compromise impersonation attack.

Original languageEnglish
Title of host publicationParallel and Distributed Processing and Applications - ISPA 2005 Workshops - ISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Proceedings
PublisherSpringer Verlag
Pages342-349
Number of pages8
ISBN (Print)3540297707, 9783540297703
DOIs
StatePublished - 2005
Externally publishedYes
EventISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA - Nanjing, China
Duration: 2 Nov 20055 Nov 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3759 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceISPA 2005 International Workshops, AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA
Country/TerritoryChina
CityNanjing
Period2/11/055/11/05

Fingerprint

Dive into the research topics of 'Security of an efficient ID-based authenticated key agreement protocol from pairings'. Together they form a unique fingerprint.

Cite this