scholarly journals On the Resilience of Key Agreement Protocols to Key Compromise Impersonation

Author(s):  
Maurizio Adriano Strangio

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.



IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Amir Masoud Rahmani ◽  
Mokhtar Mohammadi ◽  
Shima Rashidi ◽  
Jan Lansky ◽  
Stanislava Mildeova ◽  
...  


2014 ◽  
Vol 81 (1) ◽  
pp. 77-99 ◽  
Author(s):  
B. D. Deebak ◽  
R. Muthaiah ◽  
K. Thenmozhi ◽  
P. Swaminathan


2007 ◽  
Vol 6 (4) ◽  
pp. 213-241 ◽  
Author(s):  
L. Chen ◽  
Z. Cheng ◽  
N. P. Smart


Author(s):  
Priyanka Mall ◽  
Ruhul Amin ◽  
Ashok Kumar Das ◽  
Mark T. Leung ◽  
Kim-Kwang Raymond Choo


2002 ◽  
Vol 17 (6) ◽  
pp. 749-756 ◽  
Author(s):  
Dong Zheng ◽  
Kefei Chen ◽  
Jinyuan You


2018 ◽  
Vol 32 (22) ◽  
pp. 16819-16831 ◽  
Author(s):  
Zhuo Ma ◽  
Yang Liu ◽  
Zhuzhu Wang ◽  
Haoran Ge ◽  
Meng Zhao


2021 ◽  
Vol 19 (1) ◽  
pp. 66-85
Author(s):  
Yanrong Lu ◽  
◽  
Dawei Zhao ◽  

<abstract><p>Designing a secure authentication scheme for session initial protocol (SIP) over internet protocol (VoIP) networks remains challenging. In this paper, we revisit the protocol of Zhang, Tang and Zhu (2015) and reveal that the protocol is vulnerable to key-compromise impersonation attacks. We then propose a SIP authenticated key agreement protocol (AKAP) using elliptic curve cryptography (ECC). We demonstrate the correctness of the protocol using Burrows-Abadi-Needham (BAN), and its security using the AVISPA simulation tool. We also evaluate its performance against those of Zhang, Tang and Zhu, and others.</p></abstract>



Sign in / Sign up

Export Citation Format

Share Document