Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Identity-Based key agreement protocols in a multiple PKG environment
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
Information Sciences: an International Journal
An Identity-Based Signcryption Scheme for Multi-domain Ad Hoc Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper)
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Hi-index | 0.00 |
In 2005, Lee et al. proposed an ID-based 2-party key agreement protocol between users whose private keys were issued by independent PKGs that do not share any system parameters. This work was the first kind that assumes completely independent multiple PKG environment. However, Lee et al. protocol has a flaw that allows attackers to impersonate others without knowing their private keys. In this paper, we propose a modification to the protocol of Lee et al. that prevents impersonation attacks. We also show a simple technique that can improve the efficiency of tripartite key agreement protocol of Lee et al. We also provide analysis of the security and efficiency of the proposed protocols.