Cryptanalysis and improvement of the Lee-Lee identity-based key agreement protocol

Authenticated key agreement protocols are essential for secure communications in open and distributed environments. The protocol design is, however, extremely error-prone due to the inherent complexity of this problem. In this paper, we revisit an efficient identity-bas ed (ID-based) authenticated key agreement protocols due to Lee and Lee. We reveal previously unpublished flaws in the protocol, whereby we demonstrate that it is vulnerable to key control attacks which violate its claimed security attributes. We then put forward an improved protocol to fix the identified security problem.

[1]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[2]  Nigel P. Smart,et al.  AN IDENTITY BASED AUTHENTICATED KEY AGREEMENT PROTOCOL BASED ON THE WEIL PAIRING , 2001 .

[3]  Eun-Jun Yoon,et al.  An Efficient ID-Based Authenticated Key Agreement Protocol from Pairings , 2004, NETWORKING.

[4]  Kim-Kwang Raymond Choo On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols , 2006, Informatica.

[5]  Zhenfu Cao,et al.  Security of an Efficient ID-Based Authenticated Key Agreement Protocol from Pairings , 2005, ISPA Workshops.

[6]  Shyi-Tsong Wu,et al.  Identity-Based Key Agreement for Peer Group Communication from Pairings , 2005, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[7]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[8]  Gao Hai-ying Efficient ID-based authenticated key agreement protocol , 2012 .

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Hyang-Sook Lee,et al.  IDENTITY BASED AUTHENTICATED KEY AGREEMENT FROM PAIRINGS , 2005 .

[11]  Liqun Chen,et al.  Identity-based key agreement protocols from pairings , 2017, International Journal of Information Security.

[12]  Colin Boyd,et al.  Protocols for Authentication and Key Establishment , 2003, Information Security and Cryptography.

[13]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[14]  Yuh-Min Tseng,et al.  An Efficient Two-Party Identity-Based Key Exchange Protocol , 2007, Informatica.

[15]  Kyung-Ah Shim Efficient ID-based authenticated key agreement protocol based on Weil pairing , 2003 .

[16]  Hung-Min Sun,et al.  Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings , 2003, IACR Cryptol. ePrint Arch..

[17]  Colin Boyd,et al.  Security of Two-Party Identity-Based Key Agreement , 2005, Mycrypt.

[18]  Colin Boyd,et al.  On Session Key Construction in Provably-Secure Key Establishment Protocols , 2005, Mycrypt.

[19]  Gene Tsudik,et al.  Secure and minimal protocols for authenticated key distribution , 1995, Comput. Commun..

[20]  Alfred Menezes,et al.  Authenticated Diffie-Hellman Key Agreement Protocols , 1998, Selected Areas in Cryptography.