Security weakness in a three-party pairing-based protocol for password authenticated key exchange
Information Sciences: an International Journal
Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
ICISS'07 Proceedings of the 3rd international conference on Information systems security
An enhanced one-round pairing-based tripartite authenticated key agreement protocol
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Modeling leakage of ephemeral secrets in tripartite/group key exchange
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
Weakness of Shim's new ID-based tripartite multiple-key agreement protocol
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
An identity-based scheme for ad hoc network secure routing protocol from pairing
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
Security weaknesses of authenticated key agreement protocols
Information Processing Letters
Sufficient condition for ephemeral key-leakage resilient tripartite key exchange
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |
In 2000, Joux proposed a one-round protocol for tripartite Diffie-Hellman. In 2003, Shim presented an efficient one-round tripartite authenticated key agreement protocol based on Weil pairing to resist the man-in-the-middle attack appears in Jouxý s. In this paper, we show that Shimý s protocol still cannot withstand the insider attack and the key-compromise impersonation attack. We propose a secure one-round tripartite authenticated key agreement protocol to solve the existed problems.