Skip to main content

Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys

  • Conference paper
Computational Intelligence and Security (CIS 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3802))

Included in the following conference series:

  • 1210 Accesses

Abstract

In this paper, we introduce the definition of insiderimpersonation -MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Al-Riyami, S.S., Paterson, K.G.: Tripartite authenticated key agreement protocols from pairings, Cryptology ePrint Archive, Report, No.035 (2002)

    Google Scholar 

  2. Barreto, P.S.L.M., Kim, H.Y., Lynn, B., Scott, M.: Efficient algorithms for pairing-based cryptosystmes. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 354–368. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  4. Cheng, Z., Vasiu, L., Comley, R.: Pairing-based one-round tripartite key agreement protocols, Cryptology ePrint Archive, Report, No.079 (2004)

    Google Scholar 

  5. Joux, A.: A One round protocol for tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  6. Joux, A.: The Weil and Tate pairings as building blocks for public key cryptosystems. In: Fieker, C., Kohel, D.R. (eds.) ANTS 2002. LNCS, vol. 2369, pp. 20–32. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Nalla, D.: ID-based tripartite key agreement with signatures, Cryptology ePrint Archive, Report, No.144 (2003)

    Google Scholar 

  8. Nalla, D., Reddy, K.C.: ID-based tripartite authenticated key agreement protocols from pairings, Cryptology ePrint Archive, Report, No.004 (2003)

    Google Scholar 

  9. Sadeghi, A., Steiner, M.: Assumptions related to discrete logarithms: why subtleties make a real difference. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 244–261. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  10. Shim, K.: A man-in-the-middle attack on Nalla-Reddy’s ID-based tripartite authenticated key agreement protocol, Cryptology ePrint Archive, Report, No.115 (2003)

    Google Scholar 

  11. Shim, K.: Efficient one-round tripartite authenticated key agreement protocol from the Weil pairing. Electronics Letters 39, 208–209 (2003)

    Article  Google Scholar 

  12. Shim, K.: Cryptanalysis of Al-Riyami-Paterson’s authenticated three party key agreement protocols, Cryptology ePrint Archive, Report, No.122 (2003)

    Google Scholar 

  13. Zhang, F., Liu, S., Kim, K.: ID-based one round authenticated tripartite key agreement protocol with pairings, Cryptology ePrint Archive, Report, No.122 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, L., Okamoto, T., Takagi, T., Okamoto, E. (2005). Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. In: Hao, Y., et al. Computational Intelligence and Security. CIS 2005. Lecture Notes in Computer Science(), vol 3802. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11596981_30

Download citation

  • DOI: https://doi.org/10.1007/11596981_30

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30819-5

  • Online ISBN: 978-3-540-31598-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics