On the Security of Certificateless Authenticated Key Agreement Protocol

被引:2
|
作者
Hou Meng-bo [1 ]
Xu Qiu-liang [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250101, Peoples R China
关键词
D O I
10.1109/ITIME.2009.5236217
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement protocol is a fundamental building block for ensuring private communications between two or more parties over an insecure network Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In the recent work, Wang et al. proposed an efficient two-party certificateless authenticated key agreement protocol from pairings used to protect the Web client/server communication. However, we found the scheme cannot withstand key compromise impersonation attack, and also, is vulnerable to one form of the man-in-the-middle attack - key replicating attack, thus it doesn't possess some desirable security attributes, such as key compromise impersonation resilience and key integrity. We analyze the key replicating attack against the protocol in the BR93 security model in detail, and demonstrate that the protocol is not secure if the adversary was allowed to send a reveal query to reveal non-partner players who had accepted the same session key.
引用
收藏
页码:974 / 979
页数:6
相关论文
共 50 条
  • [41] A Certificateless Authenticated Key Agreement Scheme for the Power IoT
    Cui, Wenchao
    Cheng, Rui
    Wu, Kehe
    Su, Yuling
    Lei, Yuqing
    ENERGIES, 2021, 14 (19)
  • [42] Two-Party Authenticated Key Agreement Protocol from Certificateless Public Key Encryption Scheme
    Hou, Mengbo
    Xu, Qiuliang
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 440 - 444
  • [43] An elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 767 - 777
  • [44] Elliptic curve based authenticated key agreement protocol for wireless security
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1096 - 1100
  • [45] Secure Certificateless-Based Authenticated Key Agreement Protocol in the Client-Server Setting
    Hou Meng-bo
    Xu Qiu-liang
    2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 960 - 965
  • [46] Security weakness in an authenticated group key agreement protocol in two rounds
    Hwang, Jung Yeon
    Choi, Kyu Young
    Lee, Dong Hoon
    COMPUTER COMMUNICATIONS, 2008, 31 (15) : 3719 - 3724
  • [47] Security Enhancement of Ku-Wang Authenticated Key Agreement Protocol
    Chang, Chin-Chen
    Lee, Jung-San
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 467 - 471
  • [48] An improved certificateless two-party authenticated key agreement protocol for wireless sensor networks
    Deng, Lunzhi
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2020, 34 (04) : 208 - 215
  • [49] Improved pairing-free constant round certificateless authenticated group key agreement protocol
    Shan C.
    Hu K.
    Xue J.
    Hu C.
    Zhao X.
    Xue, Jingfeng (xuejf@bit.edu.cn), 1600, Tsinghua University (57): : 580 - 585
  • [50] A new two-round certificateless authenticated key agreement protocol without bilinear pairings
    He, Debiao
    Chen, Yitao
    Chen, Jianhua
    Zhang, Rui
    Han, Weiwei
    MATHEMATICAL AND COMPUTER MODELLING, 2011, 54 (11-12) : 3143 - 3152