Open AccessJournal Article
Cryptanalysis and Improvement of a New Identity-based Key Exchange Protocol
Reads0
Chats0
TLDR
It is shown that this protocol can't resist the extending key-compromise-impersonate attack, and an improvement of the identity-based protocol was proposed based on the original scheme.Abstract:
This paper extended the definition of key-compromise-impersonate attack according to a new kind of identity-based key exchange protocol presented by Wang in 2007,then showed that this protocol can't resist the extending key-compromise-impersonate attack.This paper also conducted a detailed analysis on the flaw.To avoid this shortcoming,an improvement of the identity-based protocol was proposed based on the original scheme.read more
Citations
More filters
Journal ArticleDOI
Design of Two-Party Authenticated Key Agreement Protocol Based on ECC and Self-Certified Public Keys
Sk Hafizul Islam,G. P. Biswas +1 more
TL;DR: The proposed 2PAKA protocol is computationally efficient, provably secure in the random oracle model under the Computational Diffie–Hellman assumption, and formal security validation of the scheme using Automated Validation of Internet Security Protocols and Applications software proves that it is safe against both the active and passive adversaries.
Journal ArticleDOI
Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
TL;DR: In this letter, it is shown that two identity-based authenticated key agreement protocols proposed by Holbl and Welzer are completely broken.
Proceedings ArticleDOI
A key agreement scheme for avionics communications security
TL;DR: A key agreement scheme for avionics communications security, which establishes a shared secret key so that two AAPs can communicate with each other securely at the subsequent data exchange, is proposed.