Weakness of Shim's new ID-based tripartite multiple-key agreement protocol

  • Authors:
  • Jue-Sam Chou;Chu-Hsing Lin;Chia-Hung Chiu

  • Affiliations:
  • Department of Information Management, Nanhua University, Chaiyi, Taiwan;Department of Computer Science and Information Engineering, Tunghai University, Taichung, Taiwan;Department of Computer Science and Information Engineering, Tunghai University, Taichung, Taiwan

  • Venue:
  • ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this article we show that Shim's new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their protocol.