• DocumentCode
    1454928
  • Title

    Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols

  • Author

    Shim, Kyung-Ah

  • Author_Institution
    Div. of Fusion & Convergence of Math. Sci., Nat. Inst. for Math. Sci., Daejeon, South Korea
  • Volume
    16
  • Issue
    4
  • fYear
    2012
  • fDate
    4/1/2012 12:00:00 AM
  • Firstpage
    554
  • Lastpage
    556
  • Abstract
    The identity-based infrastructure introduced by Shamir allows a user´s public key to be easily derivable from her known identity information such as an email address or a cellular phone number. Such cryptosystems alleviate the certificate overhead and solve the problems of PKI technology. In this letter, we show that two identity-based authenticated key agreement protocols proposed by Holbl and Welzer are completely broken.
  • Keywords
    cryptographic protocols; message authentication; public key cryptography; PKI technology; cellular phone number; certificate overhead; cryptanalysis; cryptosystem; email address; identity information; identity-based authenticated key agreement protocol; identity-based infrastructure; public key; Adaptation models; Authentication; Protocols; Public key; Resilience; Identity-based system; authenticated key agreement protocol; implicit key authentication; man-in-the-middle attack;
  • fLanguage
    English
  • Journal_Title
    Communications Letters, IEEE
  • Publisher
    ieee
  • ISSN
    1089-7798
  • Type

    jour

  • DOI
    10.1109/LCOMM.2012.022112.112421
  • Filename
    6156507