Paper Title:
Analysis of Two ID-Based Key Exchange Protocols
  Abstract

In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.

  Info
Periodical
Chapter
Chapter 3: Advanced Intelligence & Manufacturing
Edited by
Robin G. Qiu and Yongfeng Ju
Pages
289-293
DOI
10.4028/www.scientific.net/AMM.135-136.289
Citation
W. Wang, Q. F. Cheng, "Analysis of Two ID-Based Key Exchange Protocols", Applied Mechanics and Materials, Vols. 135-136, pp. 289-293, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Yu Liu
IV. Computational and Computer Science Technology, Algorithms
Abstract:This project aimed to make a research on code lock containing algorithm and dynamic random code based on the existing intelligent lock. This...
745
Authors: Qian Wang
Chapter 2: Information Technologies and Information Processing Algorithms
Abstract:The network information in cloud computing environment is in the format of massive data with high dimension features. In order to increase...
2315
Authors: Ji Min Zhang, Liang Zhu, Subhash Rekheja
Chapter 9: Control and Automation of Manufacturing
Abstract:The linear adaptive neural network and RBF neural network, according to the measured low-pass filter lateral acceleration signal, was used to...
985
Authors: De Zhong Ma, Wen Fei Ding, Yong Qing Jiang, Zhen Zhou
Chapter 10: Reliability and Fault Diagnosis in Mechanical Engineering and Manufacturing
Abstract:In order to solve the difficulties existing in course of complex system reliability modeling, a novel method was proposed in this paper....
1042