Analysis and improvement of an ID-based authenticated key agreement protocol
The security of a recently proposed ID-based authenticated key agreement protocol was analyzed. Although it is provably secure in the standard model, a malicious PKG (private key generator) can still obtain all of the agreed ses-sion keys, that is, it doesn’t provide PKG-forward secrecy in escrowles...
Saved in:
Main Authors: | WANG Xiao-fen1, CHEN Yuan1, XIAO Guo-zhen1 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74654458/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Security model for ID-based key exchange
by: LIU Wen-ju1, et al.
Published: (2010-01-01) -
Attribute-based authenticated key agreement protocol supporting revocation
by: Qiang LI, et al.
Published: (2014-05-01) -
Key infection and its applications in sensor networks
by: LIU Zhi-hong1, et al.
Published: (2009-01-01) -
The "one-group-one-cipher" cryptograph of block-cipher based on chaotic
by: XUAN Lei1, et al.
Published: (2009-01-01) -
Efficient three-party authenticated key agreement protocol based on chaotic map
by: Xiong LI, et al.
Published: (2016-06-01)