Title
Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol
Abstract
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to preserve confidentiality and data integrity. Since Joux [6] initiates the development of tripartite key agreement protocol, many prominent tripartite schemes have been proposed subsequently. In 2005, Tso et al. [15] have proposed an ID-based non-interactive tripartite key agreement scheme with k-resilience. Based on this scheme, they have further proposed another one-round tripartite application scheme. Although they claimed that both schemes are efficient and secure, we discover that both schemes are in fact breakable. In this paper, we impose several impersonation attacks on Tso et al.'s schemes in order to highlight their flaws. Subsequently, we propose some applicable enhancements which will not only conquer their defects, but also preserve the security attributes of an ideal key agreement protocol.
Year
DOI
Venue
2007
10.1007/978-3-540-77086-2_6
ICISS
Keywords
Field
DocType
data integrity,key agreement protocol,tripartite key agreement protocol,applicable enhancement,ideal key agreement protocol,tripartite authenticated key agreement,secret key,one-round tripartite application scheme,fact breakable,non-interactive tripartite key agreement,prominent tripartite scheme
Confidentiality,Computer science,Computer security,Cryptanalysis,Forward secrecy,Data integrity,Shared secret,Key-agreement protocol,Discrete logarithm,Weil pairing
Conference
Volume
ISSN
ISBN
4812
0302-9743
3-540-77085-2
Citations 
PageRank 
References 
5
0.45
15
Authors
3
Name
Order
Citations
PageRank
Meng-Hui Lim118822.66
Sanggon Lee27619.98
Sang-Jae Moon356251.11