Security weaknesses of a signature scheme and authenticated key agreement protocols

被引:4
|
作者
Nose, Peter [1 ]
机构
[1] Univ Ljubljana, Inst Math Phys & Mech, FRI, Ljubljana, Slovenia
关键词
Cryptography; Identity-based; Deterministic signature; Aggregate signature; Key authentication; Two-party key agreement; DISCRETE LOGARITHM; AGGREGATE; EXCHANGE;
D O I
10.1016/j.ipl.2013.11.005
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At ACISP 2012, a novel deterministic identity-based (aggregate) signature scheme was proposed that does not rely on bilinear pairing. The scheme was formally proven to be existentially unforgeable under an adaptive chosen message and identity attack. The security was proven under the strong RSA assumption in the random oracle model. In this paper, unfortunately, we show that the signature scheme is universally forgeable, i.e., an adversary can recover the private key of a user and use it to generate forged signatures on any messages of its choice having on average eight genuine signatures. This means, that realizing a deterministic identity-based signature scheme in composite order groups is still an open problem. In addition, we show that a preliminary version of the authenticated key exchange protocol proposed by Okamoto in his invited talk at ASIACRYPT 2007 is vulnerable to the key-compromise impersonation attack and therefore cannot be secure in the eCK model. We also show that the two-party identity-based key agreement protocol of Holbl et al. is vulnerable to the unknown key-share attack. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:107 / 115
页数:9
相关论文
共 50 条
  • [1] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [2] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [3] Potential weaknesses of AuthA password-authenticated key agreement protocols
    Shim, Kyung-Ah
    [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (05) : 580 - 583
  • [4] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    [J]. ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [5] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [6] Enhanced Security for the Modified Authenticated Key Agreement Scheme
    Kim, Minho
    Koc, Cetin Kaya
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (7B): : 164 - 169
  • [7] Security properties of two authenticated conference key agreement protocols
    Tang, Q
    Mitchell, CJ
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 304 - 314
  • [8] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [9] AUTHENTICATED KEY AGREEMENT SCHEME BASED ON BLOCKCHAIN FOR AMI COMMUNICATION SECURITY
    Liu, Zhendong
    Meng, Liang
    Zhao, Qingyuan
    Li, Fei
    Song, Manrui
    Jian, Yuzhi
    Tian, Hongliang
    [J]. REVUE ROUMAINE DES SCIENCES TECHNIQUES-SERIE ELECTROTECHNIQUE ET ENERGETIQUE, 2023, 68 (02): : 218 - 223