Cryptanalysis of ID-Based Authenticated Key Agreement Protocols from Bilinear Pairings (Short Paper)

  • Kyung-Ah Shim
  • Seung-Hyun Seo
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4307)


Recently, a number of ID-based authenticated key agreement protocols from bilinear pairings have been proposed. In this paper we present security analysis of four ID-based authenticated key agreement protocols from pairings proposed in [11, 12, 7, 18]. These results demonstrate that no more ID-based authenticated key agreement protocols should be constructed with such ad-hoc methods, i.e, the formal design methodology as in [1, 2, 3, 10] should be employed in future design.


Impersonation Attack Admissible Pairing Bilinear Pairing Forward Secrecy Weil Pairing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. 30th Annual Symposium on the Theory of Computing, pp. 419–428. ACM, New York (1998)Google Scholar
  2. 2.
    Bellare, M., Rogaway, P.: Provably secure session key distribution; the three party case. In: Proc. 27th Annual Sym. on the Theory of Computing, pp. 57–66. ACM, New York (1995)Google Scholar
  3. 3.
    Bellare, M., Rogaway, P.: Entity autentication and key distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)Google Scholar
  4. 4.
    Blake-Wilson, S., Johnson, D., Menezes, A.: Unknown key-share attacks on the station-to-station (STS) protocol. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 154–170. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  5. 5.
    Blake-Wilson, S., Menezes, A.: Authenticated Diffie-Hellman key agreement protocols. In: Tavares, S., Meijer, H. (eds.) SAC 1998. LNCS, vol. 1556, pp. 339–361. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  6. 6.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  7. 7.
    Choie, Y.J., Jeong, E., Lee, E.: Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation 162(1), 179–188 (2005)MATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Joux, A.: A one round protocol for tripartite Diffie-Hellman, ANTS IV. LNCS, vol. 1838, pp. 385–394. Springer, Heidelberg (2000)Google Scholar
  10. 10.
    Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Kim, K., Lee, H., Oh, H.: Enhanced ID-based authenticated key agreement protocols for a multiple independent PKG environment. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 323–335. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  12. 12.
    Kim, K., Ryu, E., Yoo, K.: ID-based authenticated multiple-key agreement protocol from pairing. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3046, pp. 672–680. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  13. 13.
    McCullagh, N., Barreto, P.S.L.M.: A new two-party identity-based authenticated key agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  14. 14.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  15. 15.
    Smart, N.: An ID-based authenticated key agreement protocol based on the Weil pairing. Elec. Lett. 38(13), 630–632 (2002)CrossRefMATHGoogle Scholar
  16. 16.
    Shim, K.: Efficient one round authenticated tripartite key agreement protocol from Weil pairing. Elec. Lett. 39(8), 653–654 (2003)CrossRefGoogle Scholar
  17. 17.
    Sun, H., Hsieh, B.: Security analysis of Shim’s authenticated key agreement protocols from pairings, Cryptogarphy ePrint Archive, Report 2003/113 (2003), available at:
  18. 18.
    Xie, G.: An ID-based key agreement scheme from pairing, Cryptology ePrint Archive: Report 2005/093 (2005), available at:

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kyung-Ah Shim
    • 1
  • Seung-Hyun Seo
    • 2
  1. 1.Department of MathematicsEwha Womans UniversitySeoulKorea
  2. 2.Graduate School of Information Securities, Center for Information Security Technologies (CIST)Korea UniversitySeoulKorea

Personalised recommendations