Cryptanalysis of certificateless authenticated key agreement protocols

被引:0
|
作者
Zeng R. [1 ]
Wang L. [1 ]
机构
[1] School of Computer, South China Normal University, Guangzhou, Guangdong Province
关键词
AKA; Authenticated key agreement; Certificateless key agreement; Certificateless public cryptography; Cryptanalysis; ECK model; Extended eCK model; Security analysis; Without pairing;
D O I
10.1504/IJAHUC.2020.108582
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this work, we cryptanalyse two certificateless authenticated key agreement (CL-AKA) protocols, Bala et al. (2018) and Xie et al. (2019), which are recently proposed claiming provable security. Specifically, we show impersonation attacks against the two protocols with successful probability 1 in extended eCK model using at most two queries. Then, the process of our cryptanalysis is abstracted to a general method for cryptanalysing a specific class of CL-AKA protocols which we call linearly-expressible CL-AKA protocol. Our method suggests new security requirements of CL-AKA protocols. Copyright © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:249 / 257
页数:8
相关论文
共 50 条
  • [41] A Certificateless Authenticated Group Key Agreement Protocol providing Forward Secrecy
    Lee, Eun-Jung
    Lee, Sang-Eon
    Yoo, Kee-Young
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 124 - +
  • [42] Simulatable certificateless two-party authenticated key agreement protocol
    Zhang, Lei
    Zhang, Futai
    Wu, Qianhong
    Domingo-Ferrer, Josep
    INFORMATION SCIENCES, 2010, 180 (06) : 1020 - 1030
  • [43] STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles
    Ma, Yuqian
    Li, Xinghua
    Shi, Wenbo
    Cheng, Qingfeng
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 73 (04) : 4830 - 4841
  • [44] A new certificateless authenticated key agreement protocol for SIP with different KGCs
    Li, Xiaowei
    Zhang, Yuqing
    Zhang, Geifei
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 631 - 643
  • [45] Certificateless and identity-based authenticated asymmetric group key agreement
    Zhang, Lei
    Wu, Qianhong
    Qin, Bo
    Deng, Hua
    Li, Jiangtao
    Liu, Jianwei
    Shi, Wenchang
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (05) : 559 - 576
  • [46] Certificateless and identity-based authenticated asymmetric group key agreement
    Lei Zhang
    Qianhong Wu
    Bo Qin
    Hua Deng
    Jiangtao Li
    Jianwei Liu
    Wenchang Shi
    International Journal of Information Security, 2017, 16 : 559 - 576
  • [47] A Secure and Efficient Certificateless Authenticated Key Agreement Scheme for Smart Healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 17 - 31
  • [48] An efficient certificateless two-party authenticated key agreement protocol
    He, Debiao
    Padhye, Sahadeo
    Chen, Jianhua
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 64 (06) : 1914 - 1926
  • [49] Provably secure and efficient certificateless authenticated tripartite key agreement protocol
    Xiong, Hu
    Chen, Zhong
    Li, Fagen
    MATHEMATICAL AND COMPUTER MODELLING, 2012, 55 (3-4) : 1213 - 1221
  • [50] A Pairing-free Certificateless Authenticated Group key Agreement Protocol
    Gu Xiaozhuo
    Xu Taizhong
    Zhou Weihua
    Wang Yongming
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 510 - 513