期刊文献+

两个无证书两方认证密钥协商协议分析 被引量:2

Analysis of Two Certificateless Two-Party Authenticated Key Agreement Protocols
在线阅读 下载PDF
导出
摘要 利用对无证书密钥协商协议常见的攻击方法,分析了两个无证书两方认证密钥协商协议的安全性.基于不同秘密信息泄露情况,分别对两个协议给出了密钥泄露伪装攻击、临时密钥泄露攻击等多种攻击方法.结果表明,两个协议都存在严重的安全缺陷. Combined with common attack methods against certificateless authenticated key agreement proto- cols, this paper analyzes two certificateless authenticated key agreement protocols proposed by Liu et al. and Yang et al. respectively. Based on the different leakage of secret information, this paper presents various attacks against two certificateless authenticated key agreement protocols, such as key compromise impersonation attack and ephem- eral key compromise attack. The results show that both of two certificateless authenticated key agreement protocols are insecure.
出处 《洛阳师范学院学报》 2013年第5期53-56,共4页 Journal of Luoyang Normal University
基金 解放军外国语学院科研基金项目(2011XYZ004)
关键词 密钥协商 认证 两方 无证书 攻击 key agreement authentication two-party certificateless attack
  • 相关文献

参考文献12

  • 1Diffie W, Hellman M. New directions in cryptography [J]. IEEE Transaction on Information Theory, 1976, 22 (6) : 644 -654.
  • 2AI- Riyami S S, Paterson K G. Certificateless public key Cryptography [ C]//Proc of 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin: Springer - Verlag, 2003 : 452 - 473.
  • 3Huang Xinyi, Susilo Willy, Mu Yi, Futai Zhang, On the Security of Certificateless Signature Schemes from Asiacrypt 2003 [C]//Proc of CANS 2005. Berlin: Springer - Ver- lag, 2005 : 13 - 25.
  • 4Au M H, Chen J, Liu J, et al. Malicious KGC attack in certificateless cryptography [ C ]//Proc of ACM Symposium on Information, Computer and Communications Security. New York, USA: ACM, 2007:302 -311.
  • 5Dent Alexander W. A survey of certificateless encryption schemes and security models [ J ]. International Journal of Information Security, 2008, 7 (5) : 349 - 377.
  • 6Lippold G, Boyd C, Gonzalez Nieto J M. Strongly secure certificateless key agreement [ C ]//Proc of 3rd Internation- al Conference on Pairing - Based Cryptography. Berlin, Germany: Springer - Verlag, 2009 : 206 - 230.
  • 7Mokhtamameh R, Ho S, Muthuvelu N. An enhanced cer- tificateless authenticated key agreement protocol [ C ]// Proc of 13th International Conference on Advanced Commu- nication Technology. New York, USA: IEEE, 2011:802 - 806.
  • 8He D B, Chen Y T, Chen J H, et a/. A new two - round eertificateless authenticated key agreement protocol withoutbilinear pairings [ J ]. Mathematical and Computer Model- ling, 2011, 54( 11 - 12) : 3143 -3152.
  • 9Xiong H, Chen Z, Li F G. Provably secure and efficient certificateless authenticated tripartite key agreement proto- col [ J ]. Mathematical and Computer Modelling, 2012, 55 (3 -4) : 1213 - 1221.
  • 10刘文浩,许春香.无证书两方密钥协商方案[J].软件学报,2011,22(11):2843-2852. 被引量:24

二级参考文献19

  • 1SHAOZu-hua.Efficient Authenticated Key Agreement Protocol Using Self-Certified Public Keys from Pairings[J].Wuhan University Journal of Natural Sciences,2005,10(1):267-270. 被引量:12
  • 2WANG Shengbao,CAO Zhenfu,WANG Licheng.Efficient Certificateless Authenticated Key Agreement Protocol from Pairings[J].Wuhan University Journal of Natural Sciences,2006,11(5):1278-1282. 被引量:24
  • 3SHI Yijuan LI Jianhua.Two-Party Authenticated Key Agreement in Certificateless Public Key Cryptography[J].Wuhan University Journal of Natural Sciences,2007,12(1):71-74. 被引量:23
  • 4DiffieW, Van Oorschot P C, Wiener M J. Authentication and authenticated key exchanges [J]. Designs, Codes and Cryptography, 1992, 2(2): 107-125.
  • 5Adams C, Lloyd S. Understanding public-key infrastructure-concepts, standards, and deployment considerations [M]. Indiana, USA: Sarns, 1999.
  • 6Shamir A. Identity-based cryptosystems and signature schemes [C]//Proc 4th Annual International Cryptology Conference on Advances in Cryptology. New York, NY, USA: Springer-Verlag, 1984:47-53.
  • 7AI Riyami S S, Paterson K G. Certificateless public key cryptography [C]//Proc 9th International Conference on the Theory and Application of Cryptology and Information Security. Berlin, Germany: Springer-Verlag, 2003: 452- 473.
  • 8Dutta R, Barua R, Sarkar P. Pairing-based cryptographic protocols: a survey [R/OL]. (2004-06-24). http: //eprint. iacr. org/2004/064.
  • 9Joux A. A one round protocol {or tripartite Diffie-Hellman [C]//Proc 4th international symposium on algorithmic number theory. London, UK: Springer-Verlag, 2000: 385- 393.
  • 10Boneh D, Franklin M K. Identity based encryption from the Weii pairing [C]//Proc 21st Annual International Cryptology Conference on Advances in Cryptology. London, UK: Springer-Verlag, 2001: 213- 229.

共引文献31

同被引文献10

引证文献2

二级引证文献22

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部