scispace - formally typeset
Open AccessJournal Article

Cryptanalysis and Improvement of a New Identity-based Key Exchange Protocol

Reads0
Chats0
TLDR
It is shown that this protocol can't resist the extending key-compromise-impersonate attack, and an improvement of the identity-based protocol was proposed based on the original scheme.
Abstract
This paper extended the definition of key-compromise-impersonate attack according to a new kind of identity-based key exchange protocol presented by Wang in 2007,then showed that this protocol can't resist the extending key-compromise-impersonate attack.This paper also conducted a detailed analysis on the flaw.To avoid this shortcoming,an improvement of the identity-based protocol was proposed based on the original scheme.

read more

Citations
More filters
Journal ArticleDOI

Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys

TL;DR: The proposed 2PAKA protocol is computationally efficient, provably secure in the random oracle model under the Computational Diffie–Hellman assumption, and formal security validation of the scheme using Automated Validation of Internet Security Protocols and Applications software proves that it is safe against both the active and passive adversaries.
Journal ArticleDOI

Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols

TL;DR: In this letter, it is shown that two identity-based authenticated key agreement protocols proposed by Holbl and Welzer are completely broken.
Proceedings ArticleDOI

A key agreement scheme for avionics communications security

TL;DR: A key agreement scheme for avionics communications security, which establishes a shared secret key so that two AAPs can communicate with each other securely at the subsequent data exchange, is proposed.
Related Papers (5)