Analysis of Two ID-Based Key Exchange Protocols

Abstract:

Article Preview

In this paper, we analyze two ID-based authenticated key exchange (AKE) protocols in the eCK model. One is a two-party AKE protocol between members of distinct domains proposed by Xia et al. in 2009. The other is a dynamic group AKE protocol proposed by Xie et al. in 2010. The results of analysis show that both of them are insecure in the eCK model.

Info:

Periodical:

Edited by:

Robin G. Qiu and Yongfeng Ju

Pages:

289-293

DOI:

10.4028/www.scientific.net/AMM.135-136.289

Citation:

W. Wang and Q. F. Cheng, "Analysis of Two ID-Based Key Exchange Protocols", Applied Mechanics and Materials, Vols. 135-136, pp. 289-293, 2012

Online since:

October 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.