본문 바로가기 주메뉴 바로가기
검색 검색영역닫기 검색 검색영역닫기 ENGLISH 메뉴 전체보기 메뉴 전체보기

논문

Cryptanalysis of Two Identity-based Authenticated key Agreement Protocols

https://doi.org/10.1109/LCOMM.2012.022112.112421

  • 저자Kyung-Ah Shim
  • 학술지IEEE COMMUNICATIONS LETTERS 16
  • 등재유형
  • 게재일자(2012)


The identity-based infrastructure introduced by Shamir allows a user's public key to be easily derivable from her known identity information such as an email address or a cellular phone number. Such cryptosystems alleviate the certificate overhead and solve the problems of PKI technology. In this letter, we show that two identity-based authenticated key agreement protocols proposed by Holbl and Welzer are completely broken.


The identity-based infrastructure introduced by Shamir allows a user's public key to be easily derivable from her known identity information such as an email address or a cellular phone number. Such cryptosystems alleviate the certificate overhead and solve the problems of PKI technology. In this letter, we show that two identity-based authenticated key agreement protocols proposed by Holbl and Welzer are completely broken.

이 페이지에서 제공하는 정보에 대해 만족하십니까?