Abstract
In this paper, we introduce the definition of insiderimpersonation -MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Riyami, S.S., Paterson, K.G.: Tripartite authenticated key agreement protocols from pairings, Cryptology ePrint Archive, Report, No.035 (2002)
Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystmes. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Cheng, Z., Vasiu, L., Comley, R.: Pairing-based one-round tripartite key agreement protocols, Cryptology ePrint Archive, Report, No.079 (2004)
Joux, A.: A One round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)
Joux, A.: The Weil and Tate pairings as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 20–32. Springer, Heidelberg (2002)
Nalla, D.: ID-based tripartite key agreement with signatures, Cryptology ePrint Archive, Report, No.144 (2003)
Nalla, D., Reddy, K.C.: ID-based tripartite authenticated key agreement protocols from pairings, Cryptology ePrint Archive, Report, No.004 (2003)
Sadeghi, A., Steiner, M.: Assumptions related to discrete logarithms: why subtleties make a real difference. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 244–261. Springer, Heidelberg (2001)
Shim, K.: A man-in-the-middle attack on Nalla-Reddy’s ID-based tripartite authenticated key agreement protocol, Cryptology ePrint Archive, Report, No.115 (2003)
Shim, K.: Efficient one-round tripartite authenticated key agreement protocol from the Weil pairing. Electronics Letters 39, 208–209 (2003)
Shim, K.: Cryptanalysis of Al-Riyami-Paterson’s authenticated three party key agreement protocols, Cryptology ePrint Archive, Report, No.122 (2003)
Zhang, F., Liu, S., Kim, K.: ID-based one round authenticated tripartite key agreement protocol with pairings, Cryptology ePrint Archive, Report, No.122 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, L., Okamoto, T., Takagi, T., Okamoto, E. (2005). Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_30
Download citation
DOI: https://doi.org/10.1007/11596981_30
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30819-5
Online ISBN: 978-3-540-31598-8
eBook Packages: Computer ScienceComputer Science (R0)