Article ID Journal Published Year Pages File Type
394965 Information Sciences 2009 12 Pages PDF
Abstract

We revisit the identity-based (ID-based) key agreement protocol due to Ryu et al. The protocol is highly efficient and suitable for real-world applications despite offering no resilience against key-compromise impersonation (K-CI). We show that the protocol is also insecure against reflection attacks. We propose a slight modification to the protocol and prove its security in a widely accepted model.

Related Topics
Physical Sciences and Engineering Computer Science Artificial Intelligence
Authors
, , , ,