On security proof of McCullagh-Barreto's key agreement protocol and its variants.
Cheng, Zhaohui and Chen, Liqun (2007) On security proof of McCullagh-Barreto's key agreement protocol and its variants. International Journal of Security and Networks (IJSN), Special Issue on Cryptography in Network, 2 (3-4). pp. 251-259. ISSN 1747-8405
Full text is not in this repository.
Official URL: http://www.inderscience.com/search/index.php?actio...
McCullagh and Barreto presented an identity-based key agreement protocol in CT-RSA 2005. Later McCullagh-Barreto and Xie proposed two variants of the protocol respectively. Due to using the Sakai-Kasahara key construction, these protocols achieve the best performance among this type of protocols. However, the security of the schemes was in doubt. In this paper, the errors in the existing security analyses of the schemes were first point out and then the McCullagh-Barreto's second protocol was slightly tweaked and formally proved based on a reasonable assumption. The formal analyse builds strong confidence in the security of the new scheme particularly for standardisation.
|Research Areas:||Middlesex University Schools and Centres > School of Science and Technology > Computer and Communications Engineering|
|Deposited On:||21 Oct 2008 12:33|
|Last Modified:||13 May 2014 15:37|
Repository staff only: item control page
Full text downloads (NB count will be zero if no full text documents are attached to the record)
Downloads per month over the past year