Abstract
A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to preserve confidentiality and data integrity. Since Joux proposed the first pairing-based one-round tripartite key agreement protocol in 2000, numerous authenticated protocols have been proposed after then. However, most of them have turned out to be flawed due to their inability in achieving some desirable security attributes. In 2005, Lin-Li had identified the weaknesses of Shim’s protocol and subsequently proposed their improved scheme by introducing an extra verification process. In this paper, we prove that Lin-Li’s improved scheme remains insecure due to its susceptibility to the insider impersonation attack. Based on this, we propose an enhanced scheme which will not only conquer their defects, but also preserves the desired security attributes of a key agreement protocol.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Riyami, S.S., Paterson, K.G.: Tripartite Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive: Report (035) (2002)
Boyd, C., Mao, W., Paterson, K.G.: Deniable Authenticated Key Establishment for Internet Protocols. In: 11th International Workshop on Security Protocols, Cambridge (UK) (April 2003)
Cheng, Z.H., Vasiu, L., Comley, R.: Pairing-based One-round Tripartite Key Agreement Protocols, Cryptology ePrint Archive, Report (079) (2004)
Chien, H.Y.: Comments: Insider Attack on Cheng et al’s Pairing-based Tripartite Key Agreement Protocols, Cryptology ePrint Archive: Report (013) (2005)
Chien, H.Y., Lin, R.Y.: An Improved Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing. Int. J. Appl. Sci. Eng. 3(1) (2005)
Chou, J.S., Chen, Y.L., Yang, M.D.: Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols, Cryptology ePrint Archive: Report (451) (2005)
Chou, J.S., Lin, C.H., Chiu, C.H.: Weakness of Shim’s New ID-based Tripartite Multiple-key Agreement Protocol, Cryptology ePrint Archive: Report (457) (2005)
Joux, A.: A One-round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) Algorithmic Number Theory. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)
Lim, M.H., Lee, S.G., Park, Y.H., Lee, H.J.: An Enhanced ID-based Deniable Authentication Protocol on Pairings, Cryptology ePrint Archive: Report (113) (2007)
Lin, C.H., Li, H.H.: Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), pp. 135–138 (2005)
Nalla, D.: ID-based Tripartite Key Agreement with Signatures, Cryptology ePrint Archive: Report (144) (2003)
Nalla, D., Reddy, K.C.: ID-based tripartite Authenticated Key Agreement Protocols from pairings, Cryptology ePrint Archive: Report (004) (2003)
Shim, K.: Cryptanalysis of Al-Riyami-Paterson’s Authenticated Three Party Key Agreement Protocols, Cryptology ePrint Archive: Report (122) (2003)
Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol based on Weil Pairing. Electronics Letters 39(8), 653–654 (2003)
Shim, K.: Efficient One-round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. Electronics Letters 39(2), 208–209 (2003)
Sun, H.M., Hsieh, B.T.: Security Analysis of Shim’s Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive: Report (113) (2003)
Tso, R., Okamoto, T., Takagi, T., Okamoto, E.: An ID-based Non-Interactive Tripartite Key Agreement Protocol with K-Resilience, Communications and Computer Networks, pp. 38-42 (2005)
Xun, Y.: Efficient ID-based Key Agreement from the Weil Pairing. Electronics Letters 39(8), 206–208 (2003)
Wilson, S.B., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556. Springer, Heidelberg (1999)
Wilson, S.B., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol. 1355, pp. 339–361. Springer, Heidelberg (1997)
Zhang, F.G., Liu, S.L., Kim, K.J.: ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings, Cryptology ePrint Archive: Report (122) (2002)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, MH., Lee, S., Park, Y., Lee, H. (2007). An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol. In: Gervasi, O., Gavrilova, M.L. (eds) Computational Science and Its Applications – ICCSA 2007. ICCSA 2007. Lecture Notes in Computer Science, vol 4706. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74477-1_47
Download citation
DOI: https://doi.org/10.1007/978-3-540-74477-1_47
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74475-7
Online ISBN: 978-3-540-74477-1
eBook Packages: Computer ScienceComputer Science (R0)