Welcome to the resource topic for 2005/357
Title:
Cryptanalysis of Two ID-based Authenticated Key Agreement Protocols from Pairings
Authors: Kyung-Ah Shim
Abstract:Recently, a number of ID-based two-party
authenticated key agreement protocols which make of bilinear
pairings have been proposed \cite {CJL,MB,Sh,S,X}. In this paper, we
show that the Xie’s protocol \cite {X} does not provide implicit key
authentication and key-compromise impersonation resilience. Also, we
point out the vulnerability of the Choi {\it et al}'s protocol \cite
{CJL} against signature forgery attacks.
ePrint: https://eprint.iacr.org/2005/357
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .