International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants

Authors:
Zhaohui Cheng
Liqun Chen
Download:
URL: http://eprint.iacr.org/2005/201
Search ePrint
Search Google
Abstract: McCullagh and Barreto presented an identity-based authenticated key agreement protocol in CT-RSA 2005. Their protocol was found to be vulnerable to a key-compromise impersonation attack. In order to recover the weakness, McCullagh and Barreto, and Xie proposed two variants of the protocol respectively. In each of these works, a security proof of the proposed protocol was presented. In this paper, we revisit these three security proofs and show that all the reductions in these proofs are invalid, because the property of indistinguishability between their simulation and the real world was not held. As a replacement, we slightly modify the McCullagh and Barreto's second protocol and then formally analyse the security of the modified scheme in the Bellare-Rogaway key agreement model.
BibTeX
@misc{eprint-2005-12537,
  title={On Security Proof of McCullagh-Barreto's Key Agreement Protocol and its Variants},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / identity-based key agreement, pairing},
  url={http://eprint.iacr.org/2005/201},
  note={To appear in IJSN special issue on cryptography in networks m.z.cheng@mdx.ac.uk 13383 received 28 Jun 2005, last revised 23 Aug 2006},
  author={Zhaohui Cheng and Liqun Chen},
  year=2005
}