Paper 2005/300

Towards Security Two-part Authenticated Key Agreement Protocols

Songping Li, Quan Yuan, and Jin Li

Abstract

We first present a new security 2-AK protocol, which is more secure and more efficient than previously proposed ones. Meanwhile, we point that Xie's ID-2-AK protocol modified from McCullagh-Barreto in CT-RSA 2005 doesn't provide protection against KCI attack likewise, and finally utilize the modular arithmetic, first proposed in MQV and also used in Kim, to get a modified new ID-2-AK protocol. On second thoughts, we give another ID-2-AK protocol utilizing the operation of addition in finite field like our forenamed 2-AK protocol. The two ID-2-AK protocols are in possession of all the desired security attributes. We also compare our new protocols with others in terms of computational cost and security properties.

Note: Minor revision

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. Unknown where it was published
Keywords
key managementauthenticated protocolID-basedKey Compromise Impersonation
Contact author(s)
lsp @ pku edu cn
History
2005-09-07: last of 15 revisions
2005-09-02: received
See all versions
Short URL
https://ia.cr/2005/300
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2005/300,
      author = {Songping Li and Quan Yuan and Jin Li},
      title = {Towards Security Two-part Authenticated Key Agreement Protocols},
      howpublished = {Cryptology ePrint Archive, Paper 2005/300},
      year = {2005},
      note = {\url{https://eprint.iacr.org/2005/300}},
      url = {https://eprint.iacr.org/2005/300}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.