An improved identity-based key agreement protocol and its security proof
| dc.contributor.author | Wang, S. | |
| dc.contributor.author | Cao, Z. | |
| dc.contributor.author | Choo, K.K. | |
| dc.contributor.author | Wang, L. | |
| dc.date.issued | 2009 | |
| dc.description.abstract | We revisit the identity-based (ID-based) key agreement protocol due to Ryu et al. The protocol is highly efficient and suitable for real-world applications despite offering no resilience against key-compromise impersonation (K-CI). We show that the protocol is also insecure against reflection attacks. We propose a slight modification to the protocol and prove its security in a widely accepted model. | |
| dc.identifier.citation | Information Sciences, 2009; 179(3):307-318 | |
| dc.identifier.doi | 10.1016/j.ins.2008.09.020 | |
| dc.identifier.issn | 0020-0255 | |
| dc.identifier.uri | https://hdl.handle.net/1959.8/120170 | |
| dc.language.iso | en | |
| dc.publisher | Elsevier | |
| dc.relation.funding | National High Technology Development Program of China 2006AA01Z424 | |
| dc.relation.funding | National Natural Science Foundation of China 60673079 | |
| dc.relation.funding | National Natural Science Foundation of China 60773086 | |
| dc.relation.funding | National 973 Program of China 2007CB311201 | |
| dc.rights | Copyright 2009 Elsevier | |
| dc.source.uri | https://doi.org/10.1016/j.ins.2008.09.020 | |
| dc.subject | key agreement protocols | |
| dc.subject | reflection attack | |
| dc.subject | provable security | |
| dc.subject | modular proof | |
| dc.subject | PKG forward secrecy | |
| dc.title | An improved identity-based key agreement protocol and its security proof | |
| dc.type | Journal article | |
| pubs.publication-status | Published | |
| ror.mmsid | 9915910743301831 |