Cryptanalysis of certificateless authenticated key agreement protocols

被引:0
|
作者
Zeng R. [1 ]
Wang L. [1 ]
机构
[1] School of Computer, South China Normal University, Guangzhou, Guangdong Province
关键词
AKA; Authenticated key agreement; Certificateless key agreement; Certificateless public cryptography; Cryptanalysis; ECK model; Extended eCK model; Security analysis; Without pairing;
D O I
10.1504/IJAHUC.2020.108582
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this work, we cryptanalyse two certificateless authenticated key agreement (CL-AKA) protocols, Bala et al. (2018) and Xie et al. (2019), which are recently proposed claiming provable security. Specifically, we show impersonation attacks against the two protocols with successful probability 1 in extended eCK model using at most two queries. Then, the process of our cryptanalysis is abstracted to a general method for cryptanalysing a specific class of CL-AKA protocols which we call linearly-expressible CL-AKA protocol. Our method suggests new security requirements of CL-AKA protocols. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:249 / 257
页数:8
相关论文
共 50 条
  • [21] A Certificateless Authenticated Key Agreement Scheme for the Power IoT
    Cui, Wenchao
    Cheng, Rui
    Wu, Kehe
    Su, Yuling
    Lei, Yuqing
    ENERGIES, 2021, 14 (19)
  • [22] Certificateless and Identity based Authenticated Key Exchange Protocols
    Badrinarayanan, Saikrishna
    Rangan, C. Pandu
    E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
  • [23] Cryptanalysis and Improvements on Three-party-authenticated Key Agreement Protocols Based on Chaotic Maps
    Chen, Chien-Ming
    Xu, Linlin
    Wang, King-Hang
    Liu, Shuai
    Wu, Tsu-Yang
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (03): : 679 - 687
  • [24] Certificateless-based two-party authenticated Key agreement Protocols in a Multiple PKG Environment
    Pan Jin
    Liu Xiaoqiong
    Xie Minghui
    Liu Qiong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2364 - 2367
  • [25] Authenticated asymmetric group key agreement based on certificateless cryptosystem
    Lv, Xixiang
    Li, Hui
    Wang, Baocang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2014, 91 (03) : 447 - 460
  • [26] Efficient Certificateless Authenticated Asymmetric Group Key Agreement Protocol
    Wei, Guiyi
    Yang, Xianbo
    Shao, Jun
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (12): : 3352 - 3365
  • [27] Certificateless authenticated key agreement for blockchain-based WBANs
    Mwitende, Gervais
    Ye, Yalan
    Ali, Ikram
    Li, Fagen
    JOURNAL OF SYSTEMS ARCHITECTURE, 2020, 110
  • [28] Certificateless authenticated Group Key Agreement protocol for dynamic groups
    Heo, Sungchul
    Kim, Zeen
    Kim, Kwangjo
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 464 - 468
  • [29] Efficient Certificateless Authenticated Key Agreement Protocol from Pairings
    WANG Shengbao~ 1
    2. Center of Computing
    Wuhan University Journal of Natural Sciences, 2006, (05) : 1278 - 1282
  • [30] A pairing-free certificateless authenticated key agreement protocol
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (02) : 221 - 230