Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
394965 | Information Sciences | 2009 | 12 Pages |
Abstract
We revisit the identity-based (ID-based) key agreement protocol due to Ryu et al. The protocol is highly efficient and suitable for real-world applications despite offering no resilience against key-compromise impersonation (K-CI). We show that the protocol is also insecure against reflection attacks. We propose a slight modification to the protocol and prove its security in a widely accepted model.
Keywords
Related Topics
Physical Sciences and Engineering
Computer Science
Artificial Intelligence
Authors
Shengbao Wang, Zhenfu Cao, Kim-Kwang Raymond Choo, Lihua Wang,