Enhancements of authenticated multiple key exchange protocol based on bilinear pairings

  • Authors:
  • Duc-Liem Vo;Hyunrok Lee;Chan-Yeob Yeun;Kwangjo Kim

  • Affiliations:
  • Korea Advanced Institute of Science and Technology, IT Convergence Campus (KAIST-ICC), Daejeon 305-732, Republic of Korea;Korea Advanced Institute of Science and Technology, IT Convergence Campus (KAIST-ICC), Daejeon 305-732, Republic of Korea;Khalifa University of Science, Technology & Research (KUSTAR), P.O.Box 573, Sharjah, United Arab Emirates;Korea Advanced Institute of Science and Technology, IT Convergence Campus (KAIST-ICC), Daejeon 305-732, Republic of Korea

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate an entity to share multiple session keys with another entity of his/her choice by using only the public key of the victim. Moreover, their protocol fails to provide perfect forward secrecy, despite of their claim to the contrary. Thus, we propose a simple modification to the original protocol which avoids our attack.