An Improved ID-Based Authentication and Key Distribution Protocol

  • Authors:
  • Wei-Chi Ku

  • Affiliations:
  • -

  • Venue:
  • ICOIN '02 Revised Papers from the International Conference on Information Networking, Wireless Communications Technologies and Network Applications-Part II
  • Year:
  • 2002

Quantified Score

Hi-index 0.00

Visualization

Abstract

It has been pointed out that the Shieh-Yang-Sun ID-based authentication and key distribution protocol is vulnerable to the replay attack and the unknown key share attack. We further demonstrate that the protocol is vulnerable to the forgery attack, too. In addition, we describe an improved protocol that has better resistance ability to these attacks.