Advertisement

An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol

  • Meng-Hui Lim
  • Sanggon Lee
  • Youngho Park
  • Hoonjae Lee
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4706)

Abstract

A tripartite authenticated key agreement protocol is generally designed to accommodate the need of three specific entities in communicating over an open network with a shared secret key, which is used to preserve confidentiality and data integrity. Since Joux proposed the first pairing-based one-round tripartite key agreement protocol in 2000, numerous authenticated protocols have been proposed after then. However, most of them have turned out to be flawed due to their inability in achieving some desirable security attributes. In 2005, Lin-Li had identified the weaknesses of Shim’s protocol and subsequently proposed their improved scheme by introducing an extra verification process. In this paper, we prove that Lin-Li’s improved scheme remains insecure due to its susceptibility to the insider impersonation attack. Based on this, we propose an enhanced scheme which will not only conquer their defects, but also preserves the desired security attributes of a key agreement protocol.

Keywords

Authentication Protocol Verification Process Perfect Forward Secrecy Weil Pairing Cryptology ePrint Archive 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Al-Riyami, S.S., Paterson, K.G.: Tripartite Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive: Report (035) (2002)Google Scholar
  2. 2.
    Boyd, C., Mao, W., Paterson, K.G.: Deniable Authenticated Key Establishment for Internet Protocols. In: 11th International Workshop on Security Protocols, Cambridge (UK) (April 2003)Google Scholar
  3. 3.
    Cheng, Z.H., Vasiu, L., Comley, R.: Pairing-based One-round Tripartite Key Agreement Protocols, Cryptology ePrint Archive, Report (079) (2004)Google Scholar
  4. 4.
    Chien, H.Y.: Comments: Insider Attack on Cheng et al’s Pairing-based Tripartite Key Agreement Protocols, Cryptology ePrint Archive: Report (013) (2005)Google Scholar
  5. 5.
    Chien, H.Y., Lin, R.Y.: An Improved Tripartite Authenticated Key Agreement Protocol Based on Weil Pairing. Int. J. Appl. Sci. Eng. 3(1) (2005)Google Scholar
  6. 6.
    Chou, J.S., Chen, Y.L., Yang, M.D.: Weaknesses of the Boyd-Mao Deniable Authenticated key Establishment for Internet Protocols, Cryptology ePrint Archive: Report (451) (2005)Google Scholar
  7. 7.
    Chou, J.S., Lin, C.H., Chiu, C.H.: Weakness of Shim’s New ID-based Tripartite Multiple-key Agreement Protocol, Cryptology ePrint Archive: Report (457) (2005)Google Scholar
  8. 8.
    Joux, A.: A One-round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) Algorithmic Number Theory. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  9. 9.
    Lim, M.H., Lee, S.G., Park, Y.H., Lee, H.J.: An Enhanced ID-based Deniable Authentication Protocol on Pairings, Cryptology ePrint Archive: Report (113) (2007)Google Scholar
  10. 10.
    Lin, C.H., Li, H.H.: Secure One-Round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. In: Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), pp. 135–138 (2005)Google Scholar
  11. 11.
    Nalla, D.: ID-based Tripartite Key Agreement with Signatures, Cryptology ePrint Archive: Report (144) (2003)Google Scholar
  12. 12.
    Nalla, D., Reddy, K.C.: ID-based tripartite Authenticated Key Agreement Protocols from pairings, Cryptology ePrint Archive: Report (004) (2003)Google Scholar
  13. 13.
    Shim, K.: Cryptanalysis of Al-Riyami-Paterson’s Authenticated Three Party Key Agreement Protocols, Cryptology ePrint Archive: Report (122) (2003)Google Scholar
  14. 14.
    Shim, K.: Efficient ID-based Authenticated Key Agreement Protocol based on Weil Pairing. Electronics Letters 39(8), 653–654 (2003)CrossRefGoogle Scholar
  15. 15.
    Shim, K.: Efficient One-round Tripartite Authenticated Key Agreement Protocol from Weil Pairing. Electronics Letters 39(2), 208–209 (2003)CrossRefGoogle Scholar
  16. 16.
    Sun, H.M., Hsieh, B.T.: Security Analysis of Shim’s Authenticated Key Agreement Protocols from Pairings, Cryptology ePrint Archive: Report (113) (2003)Google Scholar
  17. 17.
    Tso, R., Okamoto, T., Takagi, T., Okamoto, E.: An ID-based Non-Interactive Tripartite Key Agreement Protocol with K-Resilience, Communications and Computer Networks, pp. 38-42 (2005)Google Scholar
  18. 18.
    Xun, Y.: Efficient ID-based Key Agreement from the Weil Pairing. Electronics Letters 39(8), 206–208 (2003)Google Scholar
  19. 19.
    Wilson, S.B., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556. Springer, Heidelberg (1999)Google Scholar
  20. 20.
    Wilson, S.B., Johnson, D., Menezes, A.: Key Agreement Protocols and their Security Analysis. In: Darnell, M. (ed.) Cryptography and Coding. LNCS, vol. 1355, pp. 339–361. Springer, Heidelberg (1997)Google Scholar
  21. 21.
    Zhang, F.G., Liu, S.L., Kim, K.J.: ID-based One Round Authenticated Tripartite Key Agreement Protocol with Pairings, Cryptology ePrint Archive: Report (122) (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Meng-Hui Lim
    • 1
  • Sanggon Lee
    • 2
  • Youngho Park
    • 3
  • Hoonjae Lee
    • 2
  1. 1.Department of Ubiquitous IT, Graduate school of Design & IT, Dongseo University, Busan 617-716Korea
  2. 2.Department of Information & Communication, Dongseo University, Busan 617-716Korea
  3. 3.School of Electronics and Electrical Engineering, Sangju National University, Sangju-Si, Gyeongsangbuk-do 742-711Korea

Personalised recommendations