摘要
Authenticated key agreement protocols are a foundation for delivering an authenticated session key between the intended two-party participants from a set of parties over an insecure network. Wang et al proposed protocol ECKE-1N to overcome KCI-R attacks in ECKE-1 as an implicit authenticated key agreement protocol based on Diffie-Hellman elliptic curve. In this paper, we show that ECKE-1N is vulnerable to both leakage of ephemeral private keys and KCI-R attacks. We present an enhanced protocol EECKE-1N, which can withstand KCI-R attacks and revelations both of ephemeral keys. Furthermore, EECKE-1N can provide desirable security proprieties.
| 原文 | English |
|---|---|
| 頁面 | 128-132 |
| 頁數 | 5 |
| DOIs | |
| 出版狀態 | Published - 5月 2009 |
| 事件 | 1st International Conference on E-Business and Information System Security - Wuhan, 中國 持續時間: 23 5月 2009 → 24 5月 2009 |
Conference
| Conference | 1st International Conference on E-Business and Information System Security |
|---|---|
| 國家/地區 | 中國 |
| 城市 | Wuhan |
| 期間 | 23/05/09 → 24/05/09 |