Abstract
Recently, a number of ID-based authenticated key agreement protocols from bilinear pairings have been proposed. In this paper we present security analysis of four ID-based authenticated key agreement protocols from pairings proposed in [11, 12, 7, 18]. These results demonstrate that no more ID-based authenticated key agreement protocols should be constructed with such ad-hoc methods, i.e, the formal design methodology as in [1, 2, 3, 10] should be employed in future design.
This work was supported by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD) (KRF-2005-217-C00002), and by the second Brain Korea 21 Project.
Chapter PDF
References
Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. 30th Annual Symposium on the Theory of Computing, pp. 419–428. ACM, New York (1998)
Bellare, M., Rogaway, P.: Provably secure session key distribution; the three party case. In: Proc. 27th Annual Sym. on the Theory of Computing, pp. 57–66. ACM, New York (1995)
Bellare, M., Rogaway, P.: Entity autentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)
Blake-Wilson, S., Johnson, D., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154–170. Springer, Heidelberg (1999)
Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Choie, Y.J., Jeong, E., Lee, E.: Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation 162(1), 179–188 (2005)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Joux, A.: A one round protocol for tripartite Diffie-Hellman, ANTS IV. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)
Kim, K., Lee, H., Oh, H.: Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 323–335. Springer, Heidelberg (2005)
Kim, K., Ryu, E., Yoo, K.: ID-based authenticated multiple-key agreement protocol from pairing. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 672–680. Springer, Heidelberg (2004)
McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Smart, N.: An ID-based authenticated key agreement protocol based on the Weil pairing. Elec. Lett. 38(13), 630–632 (2002)
Shim, K.: Efficient one round authenticated tripartite key agreement protocol from Weil pairing. Elec. Lett. 39(8), 653–654 (2003)
Sun, H., Hsieh, B.: Security analysis of Shim’s authenticated key agreement protocols from pairings, Cryptogarphy ePrint Archive, Report 2003/113 (2003), available at: http://eprint.iacr.org/2003/113/
Xie, G.: An ID-based key agreement scheme from pairing, Cryptology ePrint Archive: Report 2005/093 (2005), available at: http://eprint.iacr.org/2005/093
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shim, KA., Seo, SH. (2006). Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper). In: Ning, P., Qing, S., Li, N. (eds) Information and Communications Security. ICICS 2006. Lecture Notes in Computer Science, vol 4307. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11935308_29
Download citation
DOI: https://doi.org/10.1007/11935308_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49496-6
Online ISBN: 978-3-540-49497-3
eBook Packages: Computer ScienceComputer Science (R0)