Entity authentication and key distribution
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Elliptic curves in cryptography
Elliptic curves in cryptography
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Key Agreement Protocols and Their Security Analysis
Proceedings of the 6th IMA International Conference on Cryptography and Coding
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Security of two-party identity-based key agreement
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
A new two-party identity-based authenticated key agreement
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
New directions in cryptography
IEEE Transactions on Information Theory
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
An improved two-party identity-based authenticated key agreement protocol using pairings
Journal of Computer and System Sciences
Enhanced Dynamic Authentication Scheme (EDAS)
Information Systems Frontiers
Hi-index | 0.00 |
In 2003, Shim proposed an efficient ID-based authenticated key agreement protocol based on Weil pairings [1]. Sun et al. raised the potential of a man-in-the-middle attack in [2]. In 2004, Ryu et al. proposed an efficient IDbased authenticated key agreement protocol from pairings [3]. In 2005, however, Boyd et al. noted security problems of Ryu et al.'s protocol in [4]. In 2005, Yuan et al. also pointed out the same weakness [5] in Ryu et al.'s protocol. Then, they proposed a new protocol that combines Ryu et al.'s protocol with Shim's protocol. In this paper, we demonstrate that Shim's protocol does not provide KGC forward secrecy, then we propose a more efficient and secure protocol which does provide such security. As a result, our protocol does not need an additional ECC point-addition unlike Yuan et al.'s protocol and our's can generate two secure session key to perform the secure message transmission.