An improved identity-based key agreement protocol and its security proof

  • Authors:
  • Shengbao Wang;Zhenfu Cao;Kim-Kwang Raymond Choo;Lihua Wang

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai 200240, China and Paobing Academy, 451 Huangshan Road, Hefei 230031, China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai 200240, China;Australian Institute of Criminology, GPO Box 2944, Canberra ACT 2601, Australia;Information Security Research Center, National Institute of Information and Communications Technology, 4-2-1, Nukui-Kitamachi, Koganei, Tokyo 1848795, Japan

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2009

Quantified Score

Hi-index 0.07

Visualization

Abstract

We revisit the identity-based (ID-based) key agreement protocol due to Ryu et al. The protocol is highly efficient and suitable for real-world applications despite offering no resilience against key-compromise impersonation (K-CI). We show that the protocol is also insecure against reflection attacks. We propose a slight modification to the protocol and prove its security in a widely accepted model.