On the Security of Certificateless Authenticated Key Agreement Protocol

被引:2
|
作者
Hou Meng-bo [1 ]
Xu Qiu-liang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
关键词
D O I
10.1109/ITIME.2009.5236217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement protocol is a fundamental building block for ensuring private communications between two or more parties over an insecure network Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In the recent work, Wang et al. proposed an efficient two-party certificateless authenticated key agreement protocol from pairings used to protect the Web client/server communication. However, we found the scheme cannot withstand key compromise impersonation attack, and also, is vulnerable to one form of the man-in-the-middle attack - key replicating attack, thus it doesn't possess some desirable security attributes, such as key compromise impersonation resilience and key integrity. We analyze the key replicating attack against the protocol in the BR93 security model in detail, and demonstrate that the protocol is not secure if the adversary was allowed to send a reveal query to reveal non-partner players who had accepted the same session key.
引用
收藏
页码:974 / 979
页数:6
相关论文
共 50 条
  • [21] A Pairing-free Certificateless Authenticated Group key Agreement Protocol
    Gu Xiaozhuo
    Xu Taizhong
    Zhou Weihua
    Wang Yongming
    2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 510 - 513
  • [22] A secure and efficient certificateless authenticated key agreement protocol for smart healthcare
    Ma, Yuqian
    Ma, Yongliu
    Liu, Yidan
    Cheng, Qingfeng
    COMPUTER STANDARDS & INTERFACES, 2023, 86
  • [23] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng R.
    Wang L.
    International Journal of Ad Hoc and Ubiquitous Computing, 2020, 34 (04): : 249 - 257
  • [24] Cryptanalysis of certificateless authenticated key agreement protocols
    Zeng, Runzhi
    Wang, Libin
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 249 - 257
  • [25] Certificateless Authenticated Key Agreement for Decentralized WBANs
    Gervais, Mwitende
    Sun, Liang
    Wang, Ke
    Li, Fagen
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 268 - 290
  • [26] Efficient three-party authenticated key agreement protocol in certificateless cryptography
    Xiong, Hu
    Chen, Zhong
    Qin, Zhiguang
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2011, 88 (13) : 2707 - 2716
  • [27] Authenticated Key Agreement protocol for Virtual Private Network based on Certificateless Cryptography
    Eldewahi, Abeer
    Basheir, Eihab
    2013 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRICAL AND ELECTRONICS ENGINEERING (ICCEEE), 2013, : 269 - 273
  • [28] Certificateless-based two-party authenticated key agreement protocol
    Hou, Meng-Bo
    Xu, Qiu-Liang
    Guo, Shan-Qing
    Ruan Jian Xue Bao/Journal of Software, 2009, 20 (SUPPL. 1): : 321 - 329
  • [29] Certificateless authenticated group key agreement protocol for unbalanced wireless mobile networks
    Lu, Chung-Fu
    Wu, Tzong-Chen
    Hsu, Chien-Lung
    WSEAS Transactions on Communications, 2009, 8 (11): : 1145 - 1159
  • [30] A strongly secure and efficient certificateless authenticated asymmetric group key agreement protocol
    Sun H.
    Cai Z.
    Zhang J.
    Zhang L.
    Gan Y.
    Sun, Haiyan (sunhaiyan2520@163.com), 2018, Totem Publishers Ltd (14) : 2831 - 2841