Security in CK model. The scheme is not resistant in the CK security model if the private keys dA and dB of the SM and SP respectively are leaked. This follows from the fact that CA = CB = dB AA and DA = DB = ▇▇▇▇. As a result, the adversary is able to compute SK = H(▇▇▇ IDB CA DA) and the security of the session key is broken.
Appears in 2 contracts
Sources: Key Agreement, Open Access License
Security in CK model. The scheme is not resistant in the CK security model if the private keys dA and dB of the SM and SP respectively are leaked. This follows from the fact that CA = CB = dB AA and DA = DB = ▇▇▇▇. As a result, the adversary is able to compute SK = H(▇▇▇ IDB CA DAH(IDAǁIDBǁCAǁDA) and the security of the session key is broken.
Appears in 2 contracts
Sources: Key Agreement, Key Agreement