Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys

Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper, we introduce the definition of insider impersonation-MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.

Original languageEnglish
Title of host publicationComputational Intelligence and Security - International Conference, CIS 2005, Proceedings
PublisherSpringer Verlag
Pages198-203
Number of pages6
ISBN (Print)3540308199, 9783540308195
DOIs
Publication statusPublished - 2005
EventInternational Conference on Computational Intelligence and Security, CIS 2005 - Xi'an, China
Duration: Dec 15 2005Dec 19 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3802 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Computational Intelligence and Security, CIS 2005
Country/TerritoryChina
CityXi'an
Period12/15/0512/19/05

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys'. Together they form a unique fingerprint.

Cite this