Correção de Deficiências no Acordo de Chaves de Mandt

  • Vilc Queupe Rufino Brazil's Navy
  • Routo Terada USP

Abstract


Mandt and Tan proposed an efficient certificateless key agreement schema based on intractability of the computational Diffie-Hellman problem. They still proposed an extended version to use with different trusted authorities. This paper shows that the extended version has a deficiency and presents a possible solution. It shows another possible correction to known vulnerability. Although our solution has complexity higher than original protocol, it is useful to develop hierarchical key agreement certificateless schemas.

References

Al-Riyami, S., Paterson, K. G. (2003). Certificateless Public Key Cryptography. In Asiacrypt’03 LCNS, pages 452–473, Taipei Taiwan. Springer Berlin. Extensão em http://eprint.iacr.org/2003/126.

Blundo, C., Santis, D. A., Herzberg, A., Kutten, S., Vaccaro, U.,, Yung, M. (1993). Perfectly secure key distribution for dynamic conferences. In LNCS Crypto’92, pages 471–486. Springer-Berlin. v.740.

Boneh, D., Franklin, M. (2001). Identity Based Encryption from Weil Pairing. In Crypto’01 LNSC, volume 2139, pages 213–229, Santa Barbara, California, USA. Springer Berlin.

Castro, R., Dahab, R. D.,, Devegili, A. J. (2007). VII Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais: Minicursos do SBSeg 2007, chapter Introdução à Segurança Demonstrável, pages 103–152. UFRJ/NCE, Rio de Janeiro.

Chen, L., Kudla, C. (2003). Identity-based authenticated key agreement protocols from pairings. In Proceedings 16th IEEE Security Foundations Workshop, pages 219–233.

Koblitz, N. (1994). A course in number theory and cryptography. Springer-Verlag, New York NY USA, 2 edition.

Mandt, T. K., Tan, C. H. (2006). Certificateless Authenticated Two-Party Key Agreement Protocols. In 11th Asian Computing Science Conference’06, volume 4435, pages 37–44, Tokyo Japan. Springer Berlin.

Sakai, R., Ohgishi, K.,, Kasahara, M. (2000). Cryptosystems based on pairing. In Symposium on Cryptography and Information Security, SCIS2000, pages 26–28, Okinawa Japan.

Singh, S. (2000). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Anchor, New York, rev. edition.

Smart, N. P. (2002). An identity based authenticated key agreement protocol based on the weil pairing. In Electronics Letters, pages 630–632. Springer Berlin. v.38.

Strangio, M. A. (2006). On the resilience of key agreement protocols to key compromise impersonation. In LNCS EuroPKI’06, pages 233–247. Springer-Berlin. v.4043.

Swanson, C. M. (2008). Security in key agreement: Two-party certificateless schemes.

Master’s thesis, University of Waterloo Canadá. http://hdl.handle.net/ 10012/4156.

Terada, R. (2008). Segurança de Dados Criptografia em redes de computador. Blucher, 2 edition.
Published
2009-09-28
RUFINO, Vilc Queupe; TERADA, Routo. Correção de Deficiências no Acordo de Chaves de Mandt. In: BRAZILIAN SYMPOSIUM ON INFORMATION AND COMPUTATIONAL SYSTEMS SECURITY (SBSEG), 9. , 2009, Campinas. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2009 . p. 101-114. DOI: https://doi.org/10.5753/sbseg.2009.20626.

Most read articles by the same author(s)

1 2 > >>