본문 바로가기 메뉴바로가기

Papers

Cryptanalysis of Two Identity-based Authenticated key Agreement Protocols

https://doi.org/10.1109/LCOMM.2012.022112.112421


The identity-based infrastructure introduced by Shamir allows a user's public key to be easily derivable from her known identity information such as an email address or a cellular phone number. Such cryptosystems alleviate the certificate overhead and solve the problems of PKI technology. In this letter, we show that two identity-based authenticated key agreement protocols proposed by Holbl and Welzer are completely broken.


The identity-based infrastructure introduced by Shamir allows a user's public key to be easily derivable from her known identity information such as an email address or a cellular phone number. Such cryptosystems alleviate the certificate overhead and solve the problems of PKI technology. In this letter, we show that two identity-based authenticated key agreement protocols proposed by Holbl and Welzer are completely broken.