全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols

Keywords: Cryptographic protocols , identity-based cryptography , authenticated key agreement , provable security

Full-Text   Cite this paper   Add to My Lib

Abstract:

We revisit the two-party identity-based authenticated key agreement protocol (2P-IDAKA) and its variant resistant to key-compromise impersonation due to McCullagh & Barreto (2005). Protocol 2P-IDAKA carries a proof of security in the Bellare & Rogaway (1993) model. In this paper, we demonstrated why both the protocol and its variant are not secure if the adversary is allowed to send a Reveal query to reveal non-partner players who had accepted the same session key (i.e., termed key-replicating attack} in recent work of Krawczyk (2005)). We also demonstrate that both protocols do not achieve the key integrity property, first discussed by Janson & Tsudik (1995).

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133