CryptoDB
Weakness of shim??s New ID-based tripartite multiple-key agreement protocol
Authors: | |
---|---|
Download: | |
Abstract: | In this article we show that Shim??s new ID-based tripartite multiple-key agreement protocol still suffers from the impersonation attack, a malicious user can launch an impersonation attack on their protocol. |
BibTeX
@misc{eprint-2005-12790, title={Weakness of shim??s New ID-based tripartite multiple-key agreement protocol}, booktitle={IACR Eprint archive}, keywords={public-key cryptography /}, url={http://eprint.iacr.org/2005/457}, note={ jschou@mail.nhu.edu.tw 13130 received 13 Dec 2005}, author={Jue-Sam Chou and Chu-Hsing Lin and Chia-Hung Chiu}, year=2005 }