Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys

Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In this paper, we introduce the definition of insider impersonation-MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.

Original languageEnglish
Title of host publicationComputational Intelligence and Security - International Conference, CIS 2005, Proceedings
Pages198-203
Number of pages6
Publication statusPublished - Dec 1 2005
EventInternational Conference on Computational Intelligence and Security, CIS 2005 - Xi'an, China
Duration: Dec 15 2005Dec 19 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3802 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherInternational Conference on Computational Intelligence and Security, CIS 2005
CountryChina
CityXi'an
Period12/15/0512/19/05

Fingerprint

Key Agreement
Computational efficiency
Attack
Computational Efficiency

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Wang, L., Okamoto, T., Takagi, T., & Okamoto, E. (2005). Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys. In Computational Intelligence and Security - International Conference, CIS 2005, Proceedings (pp. 198-203). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3802 LNAI).

Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys. / Wang, Lihua; Okamoto, Takeshi; Takagi, Tsuyoshi; Okamoto, Eiji.

Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. 2005. p. 198-203 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3802 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wang, L, Okamoto, T, Takagi, T & Okamoto, E 2005, Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys. in Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3802 LNAI, pp. 198-203, International Conference on Computational Intelligence and Security, CIS 2005, Xi'an, China, 12/15/05.
Wang L, Okamoto T, Takagi T, Okamoto E. Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys. In Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. 2005. p. 198-203. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Wang, Lihua ; Okamoto, Takeshi ; Takagi, Tsuyoshi ; Okamoto, Eiji. / Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys. Computational Intelligence and Security - International Conference, CIS 2005, Proceedings. 2005. pp. 198-203 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{cb0c80dc9ae54b5a876fdd882a1aa97d,
title = "Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys",
abstract = "In this paper, we introduce the definition of insider impersonation-MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.",
author = "Lihua Wang and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto",
year = "2005",
month = "12",
day = "1",
language = "English",
isbn = "3540308199",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "198--203",
booktitle = "Computational Intelligence and Security - International Conference, CIS 2005, Proceedings",

}

TY - GEN

T1 - Insider impersonation-MIM attack to tripartite key agreement scheme and an efficient protocol for multiple keys

AU - Wang, Lihua

AU - Okamoto, Takeshi

AU - Takagi, Tsuyoshi

AU - Okamoto, Eiji

PY - 2005/12/1

Y1 - 2005/12/1

N2 - In this paper, we introduce the definition of insider impersonation-MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.

AB - In this paper, we introduce the definition of insider impersonation-MIM attack for tripartite key agreement schemes and show that almost all of the proposed schemes are not secure under this attack. We present a new protocol which is much more efficient than the existential secure protocol [13] in terms of computational efficiency and transmitted data size. Moreover, our protocol is the first scheme for multiple keys which means that not only a large number of keys but also various kinds of keys can be generated by applying our scheme.

UR - http://www.scopus.com/inward/record.url?scp=33646844790&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33646844790&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:33646844790

SN - 3540308199

SN - 9783540308195

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 198

EP - 203

BT - Computational Intelligence and Security - International Conference, CIS 2005, Proceedings

ER -