Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment

  • Sangjin Kim
  • Hoonjung Lee
  • Heekuck Oh
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3783)


In 2005, Lee et al. proposed an ID-based 2-party key agreement protocol between users whose private keys were issued by independent PKGs that do not share any system parameters. This work was the first kind that assumes completely independent multiple PKG environment. However, Lee et al. protocol has a flaw that allows attackers to impersonate others without knowing their private keys. In this paper, we propose a modification to the protocol of Lee et al. that prevents impersonation attacks. We also show a simple technique that can improve the efficiency of tripartite key agreement protocol of Lee et al. We also provide analysis of the security and efficiency of the proposed protocols.


ID-based cryptosystem key agreement protocol multiple PKG environment 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Trans. on Information Theory 22(6), 644–654 (1976)zbMATHCrossRefMathSciNetGoogle Scholar
  2. 2.
    Shamir, A.: Identity-based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Franklin, M.: Identity-based Encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Smart, N.: An Identity-based Authenticated Key Agreement Protocol Based on Weil Pairing. Electronic Letters 38(13), 630–632 (2002)CrossRefzbMATHGoogle Scholar
  5. 5.
    Chen, L., Kudla, C.: Identity-based Authenticated Key Agreement Protocols from Pairings. In: Proc. of the 16th IEEE Computer Security Foundations Workshop, pp. 219–233. IEEE Press, Los Alamitos (2003)CrossRefGoogle Scholar
  6. 6.
    Lee, H., Kim, D., Kim, S., Oh, H.: Identity-based Key Agreement Protocols in a Multiple PKG Environment. In: Gervasi, O., Gavrilova, M.L., Kumar, V., Laganá, A., Lee, H.P., Mun, Y., Taniar, D., Tan, C.J.K. (eds.) ICCSA 2005. LNCS, vol. 3483, pp. 877–886. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Joux, A.: A One Round Protocol for Tripartite Diffie-Hellman. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  8. 8.
    Zhang, F., Liu, S., Kim, K.: ID-Based One Round Authenticated Tripartite Key Agreement Protocols with Pairings. IACR Cryptology ePrint Archive, Report 2002/122 (2002)Google Scholar
  9. 9.
    Shim, K.: Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols. IACR Cryptology ePrint Archive, Report 2003/115 (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Sangjin Kim
    • 1
  • Hoonjung Lee
    • 2
  • Heekuck Oh
    • 3
  1. 1.Korea University of Technology and EducationSchool of Information and Media EngineeringRepublic of Korea
  2. 2.HANDAN BroadInfoComRepublic of Korea
  3. 3.Department of Computer Science and EngineeringHanyang UniversityRepublic of Korea

Personalised recommendations