Cryptanalysis of certificateless authenticated key agreement protocols

被引:0
|
作者
Zeng R. [1 ]
Wang L. [1 ]
机构
[1] School of Computer, South China Normal University, Guangzhou, Guangdong Province
关键词
AKA; Authenticated key agreement; Certificateless key agreement; Certificateless public cryptography; Cryptanalysis; ECK model; Extended eCK model; Security analysis; Without pairing;
D O I
10.1504/IJAHUC.2020.108582
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this work, we cryptanalyse two certificateless authenticated key agreement (CL-AKA) protocols, Bala et al. (2018) and Xie et al. (2019), which are recently proposed claiming provable security. Specifically, we show impersonation attacks against the two protocols with successful probability 1 in extended eCK model using at most two queries. Then, the process of our cryptanalysis is abstracted to a general method for cryptanalysing a specific class of CL-AKA protocols which we call linearly-expressible CL-AKA protocol. Our method suggests new security requirements of CL-AKA protocols. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:249 / 257
页数:8
相关论文
共 50 条
  • [31] A Provable Authenticated Certificateless Group Key Agreement with Constant Rounds
    Teng, Jikai
    Wu, Chuankun
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (01) : 104 - 110
  • [32] An Improved Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 3, 2009, : 337 - 341
  • [33] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [34] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [35] Cryptanalysis of ID-based authenticated key agreement protocols from bilinear pairings (short paper)
    Shim, Kyung-Ah
    Seo, Seung-Hyun
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2006, 4307 : 410 - +
  • [37] Cryptanalysis of Lee-Lee authenticated key agreement scheme
    Kim, KW
    Ryu, EK
    Yoo, KY
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 163 (01) : 193 - 198
  • [38] Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
    He, Debiao
    ETRI JOURNAL, 2012, 34 (03) : 482 - 484
  • [39] Certificateless Key Agreement Protocols under Strong Models
    Goya, Denise H.
    Nakamura, Dionathan
    Terada, Routo
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (10): : 1822 - 1832
  • [40] Cryptanalysis of two password-authenticated key exchange protocols
    Wan, ZG
    Wang, SH
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 164 - 175