On the Security of Certificateless Authenticated Key Agreement Protocol

被引:2
|
作者
Hou Meng-bo [1 ]
Xu Qiu-liang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
关键词
D O I
10.1109/ITIME.2009.5236217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement protocol is a fundamental building block for ensuring private communications between two or more parties over an insecure network Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In the recent work, Wang et al. proposed an efficient two-party certificateless authenticated key agreement protocol from pairings used to protect the Web client/server communication. However, we found the scheme cannot withstand key compromise impersonation attack, and also, is vulnerable to one form of the man-in-the-middle attack - key replicating attack, thus it doesn't possess some desirable security attributes, such as key compromise impersonation resilience and key integrity. We analyze the key replicating attack against the protocol in the BR93 security model in detail, and demonstrate that the protocol is not secure if the adversary was allowed to send a reveal query to reveal non-partner players who had accepted the same session key.
引用
收藏
页码:974 / 979
页数:6
相关论文
共 50 条
  • [1] Hierarchical certificateless authenticated key agreement protocol
    Su H.
    Liu J.-W.
    Tao R.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (07): : 161 - 171
  • [2] An Improved Certificateless Authenticated Key Agreement Protocol
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 26 - 30
  • [3] Two-party certificateless authenticated key agreement protocol with enhanced security
    Wu Tao
    Jing Xiaojun
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2019, 26 (01) : 12 - 20
  • [4] ATwo-party Certificateless Authenticated Key Agreement Protocol with provable security
    Li Gui-ying
    Hou Meng-bo
    Zhao Chuan
    Xu Qiu-liang
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 559 - 563
  • [5] Two-party certificateless authenticated key agreement protocol with enhanced security
    Tao W.
    Xiaojun J.
    Journal of China Universities of Posts and Telecommunications, 2019, 26 (01): : 12 - 20
  • [6] Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
    Hou, Mengbo
    Xu, Qiuliang
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 2, PROCEEDINGS, 2009, : 574 - 577
  • [7] A Secure Certificateless Authenticated Group Key Agreement Protocol
    Geng, Manman
    Zhang, Futai
    Gao, Meng
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 342 - 346
  • [8] A novel pairing-free certificateless authenticated key agreement protocol with provable security
    Haiyan Sun
    Qiaoyan Wen
    Hua Zhang
    Zhengping Jin
    Frontiers of Computer Science, 2013, 7 : 544 - 557
  • [9] A novel pairing-free certificateless authenticated key agreement protocol with provable security
    Haiyan SUN
    Qiaoyan WEN
    Hua ZHANG
    Zhengping JIN
    Frontiers of Computer Science, 2013, 7 (04) : 544 - 557
  • [10] A novel pairing-free certificateless authenticated key agreement protocol with provable security
    Sun, Haiyan
    Wen, Qiaoyan
    Zhang, Hua
    Jin, Zhengping
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (04) : 544 - 557