Abstract
The certificateless authenticated key agreement protocol proposed by Mandt et al does not have the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.
Similar content being viewed by others
References
Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans Inf Theory, 1976, 22(6): 644–654.
Blake-Wilson S, Menezes A. Authenticated Diffie-Hellman Key Agreement Protocols[C]//Proceeding of SAC’1998 (LNCS 1556). New York: Springer-Verlag, 1999: 339.
Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proceeding of ASIACRYPT’03 (LNCS 2894). New York: Springer-Verlag, 2003: 452–473.
Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[EB/OL].[2003-07-02].http://www.eprint.iacr.org.
Mandt T K, Tan C H. Certificateless Authenticated Two-Party Key Agreement Protocols[C]//Proceeding of ASIAN’06 (LNCS 4435). New York: Springer-Verlag, 2008: 37.
Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[C]//Proceeding of CRYPTO’01 (LNCS 2139), New York: Springer-Verlag, 2001: 213–229.
Blake-Wilson S, Johnson C, Menezes A. Key Agreement Protocols and Their Security Analysis[C]//Proceeding of the sixth IMA International Conference on Cryptography and Coding (LNCS 1355). New York: Springer-Verlag, 1997: 30–45.
Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography[M]. New York: CRC Press, 1997.
Chen L, Kudla C. Identity Based Key Agreement Protocols from Pairings[C]//Proceeding of the 16th IEEE Computer Security Foundations Workshop. New York: IEEE Press, 2002: 219.
Mitchell C, Ward M, Wilson P. Key Control in Key Agreement Protocols[J]. Electron Lett, 1998, 34(10): 980–981.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (60773086)
Rights and permissions
About this article
Cite this article
Xia, L., Wang, S., Shen, J. et al. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. Wuhan Univ. J. Nat. Sci. 13, 562–566 (2008). https://doi.org/10.1007/s11859-008-0510-9
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-008-0510-9