Skip to main content
Log in

Breaking and repairing the certificateless key agreement protocol from ASIAN 2006

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

The certificateless authenticated key agreement protocol proposed by Mandt et al does not have the property of key-compromise impersonation (K-CI) resilience. An improved protocol with a simple modification of their protocol is proposed in this paper. In particular, our improved protocol is proved to be immune to the K-CI attack and at the same time possess other security properties.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Diffie W, Hellman M E. New Directions in Cryptography[J]. IEEE Trans Inf Theory, 1976, 22(6): 644–654.

    Article  MATH  MathSciNet  Google Scholar 

  2. Blake-Wilson S, Menezes A. Authenticated Diffie-Hellman Key Agreement Protocols[C]//Proceeding of SAC’1998 (LNCS 1556). New York: Springer-Verlag, 1999: 339.

    Google Scholar 

  3. Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[C]//Proceeding of ASIACRYPT’03 (LNCS 2894). New York: Springer-Verlag, 2003: 452–473.

    Google Scholar 

  4. Al-Riyami S S, Paterson K G. Certificateless Public Key Cryptography[EB/OL].[2003-07-02].http://www.eprint.iacr.org.

  5. Mandt T K, Tan C H. Certificateless Authenticated Two-Party Key Agreement Protocols[C]//Proceeding of ASIAN’06 (LNCS 4435). New York: Springer-Verlag, 2008: 37.

    Google Scholar 

  6. Boneh D, Franklin M. Identity-Based Encryption from the Weil Pairing[C]//Proceeding of CRYPTO’01 (LNCS 2139), New York: Springer-Verlag, 2001: 213–229.

    Google Scholar 

  7. Blake-Wilson S, Johnson C, Menezes A. Key Agreement Protocols and Their Security Analysis[C]//Proceeding of the sixth IMA International Conference on Cryptography and Coding (LNCS 1355). New York: Springer-Verlag, 1997: 30–45.

    Google Scholar 

  8. Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography[M]. New York: CRC Press, 1997.

    Google Scholar 

  9. Chen L, Kudla C. Identity Based Key Agreement Protocols from Pairings[C]//Proceeding of the 16th IEEE Computer Security Foundations Workshop. New York: IEEE Press, 2002: 219.

    Google Scholar 

  10. Mitchell C, Ward M, Wilson P. Key Control in Key Agreement Protocols[J]. Electron Lett, 1998, 34(10): 980–981.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liang Xia.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (60773086)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Xia, L., Wang, S., Shen, J. et al. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006. Wuhan Univ. J. Nat. Sci. 13, 562–566 (2008). https://doi.org/10.1007/s11859-008-0510-9

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0510-9

Key words

CLC number

Navigation