Cryptanalysis of certificateless authenticated key agreement protocols

被引:0
|
作者
Zeng R. [1 ]
Wang L. [1 ]
机构
[1] School of Computer, South China Normal University, Guangzhou, Guangdong Province
关键词
AKA; Authenticated key agreement; Certificateless key agreement; Certificateless public cryptography; Cryptanalysis; ECK model; Extended eCK model; Security analysis; Without pairing;
D O I
10.1504/IJAHUC.2020.108582
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this work, we cryptanalyse two certificateless authenticated key agreement (CL-AKA) protocols, Bala et al. (2018) and Xie et al. (2019), which are recently proposed claiming provable security. Specifically, we show impersonation attacks against the two protocols with successful probability 1 in extended eCK model using at most two queries. Then, the process of our cryptanalysis is abstracted to a general method for cryptanalysing a specific class of CL-AKA protocols which we call linearly-expressible CL-AKA protocol. Our method suggests new security requirements of CL-AKA protocols. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:249 / 257
页数:8
相关论文
共 50 条
  • [1] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257
  • [2] Cryptanalysis of simple authenticated key agreement protocols
    Yang, CC
    Chang, TY
    Hwang, MS
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (08): : 2174 - 2176
  • [3] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [4] Certificateless authenticated two-party key agreement Protocols
    Mandt, Tarjei K.
    Tan, Chik How
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 37 - 44
  • [5] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [6] Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
    Shim, Kyung-Ah
    Woo, Sung Sik
    INFORMATION SCIENCES, 2007, 177 (04) : 1143 - 1151
  • [7] A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols
    Swanson, Colleen
    Jao, David
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 57 - +
  • [8] Cryptanalysis and Enhancement of Two-pass Authenticated Key Agreement with Key Confirmation Protocols
    Mohammad, Zeyad
    Chen, Yaw-Chung
    Hsu, Chien-Lung
    Lo, Chi-Chun
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 252 - 265
  • [9] Cryptanalysis on identity-based authenticated key agreement protocols from pairings
    Hou M.
    Xu Q.
    Shanqing G.
    Jiang H.
    Journal of Networks, 2010, 5 (07) : 855 - 862
  • [10] Certificateless Authenticated Key Agreement for Decentralized WBANs
    Gervais, Mwitende
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 268 - 290