Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
نویسنده
چکیده
In this paper we propose security analysis on passive attack for Nalla-Reddy’s ID-AK-2 and ID-AK-3 protocols. Keywors:Passive attack,Tripartite key agreement,Bilinear pairings
منابع مشابه
ID-based tripartite Authenticated Key Agreement Protocols from pairings
This paper proposes ID-based tripartite authenticated key agreement protocols. The authenticated three party key agreement protocols from pairings [15], and the ID-based two party authenticated key agreement protocol [13] are studied. These two protocols are taken as the basis for designing three new ID-based tripartite authenticated key agreement protocols. The security properties of all these...
متن کاملCryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
In this paper, we show that the Nalla-Reddy’s one round IDbased tripartite authenticated key agreement protocols are still insecure against the man-in-the-middle attacks. We also break the Nalla’s IDbased tripartite authenticated key agreement protocol with signatures.
متن کاملID-based Multi-party Authenticated Key Agreement Protocols from Multilinear Forms
Nalla and Reddy [6] presented new ID-based tripartite authenticated key agreement protocols from parings. Recently, Boneh and Silverberg [4] studied a one round multi-party key agreement protocols using the certificates from multilinear forms. In this paper, we propose new ID-based multi-party authenticated key agreement protocols, which use the identity information of a user as his long-term p...
متن کاملSecurity Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
Recently, Shim proposed a tripartite authenticated key agreement protocol from Weil pairing to overcome the security flaw in Joux’s protocol. Later, Shim also proposed an ID-based authenticated key agreement protocol which is an improvement of Smart’s protocol in order to provide the forward secrecy. In this paper, we show that these two protocols are insecure against the key-compromise imperso...
متن کاملComparative Study of Tripartite Identity-Based Authenticated Key Agreement Protocols
Key agreement protocols are used to exchange keys between two or multiple entities. The exchanged key can be later used to assure confidentiality through encryption. Additionally authenticated key agreement protocols offer implicit authentication. In this paper we conduct a security and efficiency comparison of tripartite authenticated identity-based key agreement protocols and review all of th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2003 شماره
صفحات -
تاریخ انتشار 2003