Lee et al. [4] proposed two new authenticated multiple key exchange protocols based on Elliptic Curve Cryptography (ECC) and bilinear pairings. In this paper, we show an impersonation attack on their pairing-based authenticated key exchange protocol. We demonstrate that any attacker can impersonate
Efficient identity-based authenticated multiple key exchange protocol
โ Scribed by Zuowen Tan
- Publisher
- Elsevier Science
- Year
- 2011
- Tongue
- English
- Weight
- 226 KB
- Volume
- 37
- Category
- Article
- ISSN
- 0045-7906
No coin nor oath required. For personal study only.
โฆ Synopsis
Authenticated multiple key exchange protocols not only allow participants to agree the multiple session keys within one run of the protocol but also ensure the authenticity of the other party. In this paper, we propose an identity-based multiple key exchange protocol. The authentication part of the proposed protocol is provably secure in the random oracle model under the BDH assumptions. The proposed identity-based multiple key exchange protocol is secure in a formal security model under the random oracle model upon the CDH assumptions and the BDH assumptions. Compared with the identity-based multiple key exchange protocols in the literature, the proposed protocol is more efficient and holds stronger security.
๐ SIMILAR VOLUMES
In this paper, we present a strongly secure identity-based (ID-based) two-party authenticated key agreement (AKA) protocol, which captures all basic desirable security properties including master key forward secrecy, ephemeral secrets reveal resistance and so on, and is provably secure in the extend