Loading…
Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol
Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC)...
Saved in:
Main Authors: | , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 577 |
container_issue | |
container_start_page | 574 |
container_title | |
container_volume | 2 |
creator | Mengbo Hou Qiuliang Xu |
description | Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In 2007, Y.J Shi and J.H Li proposed a two-party authenticated key agreement protocol based on the certificateless encryption scheme proposed by B. Libert and J.J. Quisquater. It is found that the scheme is vulnerable to the key replicating attack (one form of the man-in-the-middle attack), so it doesnpsilat possess the security attribute of implicit key authentication and key control. We analyze such an attack of this protocol in the BR93 model in detail, and demonstrate that the protocol is not secure if the adversary is allowed to send a reveal query to reveal non-partner players who had accepted the same session key. |
doi_str_mv | 10.1109/APCIP.2009.277 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5197264</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5197264</ieee_id><sourcerecordid>5197264</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-4114ae7735542fcd04def3febcdb5dca8c5bc5e90f3f302c6a076019693d206e3</originalsourceid><addsrcrecordid>eNotjz1PwzAYhC2hSkCblYXFfyDhtR3b9RhFfFRUNEIwV479phjSpErM0H9PAkwnPac73RFywyBjDMxdUZWbKuMAJuNaX5DE6DVoZaRQxqgFuZ4tA4JxuCTJOH4CADNKcyauyMsznukrntrgbAzdgRYxWvdF-46WOMTQzBxbHEdafMcP7OIv8HTOFYcB8TgxWg197F3frsiise2Iyb8uyfvD_Vv5lG53j5uy2KaBaRnTnLHcotZCypw3zkPusREN1s7X0ju7drJ2Eg1MUAB3yk6H5tFGeA4KxZLc_vUGRNyfhnC0w3kvmdFc5eIHTllPnw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Mengbo Hou ; Qiuliang Xu</creator><creatorcontrib>Mengbo Hou ; Qiuliang Xu</creatorcontrib><description>Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In 2007, Y.J Shi and J.H Li proposed a two-party authenticated key agreement protocol based on the certificateless encryption scheme proposed by B. Libert and J.J. Quisquater. It is found that the scheme is vulnerable to the key replicating attack (one form of the man-in-the-middle attack), so it doesnpsilat possess the security attribute of implicit key authentication and key control. We analyze such an attack of this protocol in the BR93 model in detail, and demonstrate that the protocol is not secure if the adversary is allowed to send a reveal query to reveal non-partner players who had accepted the same session key.</description><identifier>ISBN: 9780769536996</identifier><identifier>ISBN: 0769536999</identifier><identifier>DOI: 10.1109/APCIP.2009.277</identifier><identifier>LCCN: 2009903120</identifier><language>eng</language><publisher>IEEE</publisher><subject>Authentication ; certificateless-based cryptography ; Computer science ; Cryptographic protocols ; Data privacy ; identity-based cryptography ; Identity-based encryption ; implicit key authentication ; Information processing ; Information security ; key agreement protocol ; key replicating attack ; Public key ; Public key cryptography</subject><ispartof>2009 Asia-Pacific Conference on Information Processing, 2009, Vol.2, p.574-577</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5197264$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5197264$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Mengbo Hou</creatorcontrib><creatorcontrib>Qiuliang Xu</creatorcontrib><title>Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol</title><title>2009 Asia-Pacific Conference on Information Processing</title><addtitle>APCIP</addtitle><description>Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In 2007, Y.J Shi and J.H Li proposed a two-party authenticated key agreement protocol based on the certificateless encryption scheme proposed by B. Libert and J.J. Quisquater. It is found that the scheme is vulnerable to the key replicating attack (one form of the man-in-the-middle attack), so it doesnpsilat possess the security attribute of implicit key authentication and key control. We analyze such an attack of this protocol in the BR93 model in detail, and demonstrate that the protocol is not secure if the adversary is allowed to send a reveal query to reveal non-partner players who had accepted the same session key.</description><subject>Authentication</subject><subject>certificateless-based cryptography</subject><subject>Computer science</subject><subject>Cryptographic protocols</subject><subject>Data privacy</subject><subject>identity-based cryptography</subject><subject>Identity-based encryption</subject><subject>implicit key authentication</subject><subject>Information processing</subject><subject>Information security</subject><subject>key agreement protocol</subject><subject>key replicating attack</subject><subject>Public key</subject><subject>Public key cryptography</subject><isbn>9780769536996</isbn><isbn>0769536999</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2009</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotjz1PwzAYhC2hSkCblYXFfyDhtR3b9RhFfFRUNEIwV479phjSpErM0H9PAkwnPac73RFywyBjDMxdUZWbKuMAJuNaX5DE6DVoZaRQxqgFuZ4tA4JxuCTJOH4CADNKcyauyMsznukrntrgbAzdgRYxWvdF-46WOMTQzBxbHEdafMcP7OIv8HTOFYcB8TgxWg197F3frsiise2Iyb8uyfvD_Vv5lG53j5uy2KaBaRnTnLHcotZCypw3zkPusREN1s7X0ju7drJ2Eg1MUAB3yk6H5tFGeA4KxZLc_vUGRNyfhnC0w3kvmdFc5eIHTllPnw</recordid><startdate>200907</startdate><enddate>200907</enddate><creator>Mengbo Hou</creator><creator>Qiuliang Xu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>200907</creationdate><title>Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol</title><author>Mengbo Hou ; Qiuliang Xu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-4114ae7735542fcd04def3febcdb5dca8c5bc5e90f3f302c6a076019693d206e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Authentication</topic><topic>certificateless-based cryptography</topic><topic>Computer science</topic><topic>Cryptographic protocols</topic><topic>Data privacy</topic><topic>identity-based cryptography</topic><topic>Identity-based encryption</topic><topic>implicit key authentication</topic><topic>Information processing</topic><topic>Information security</topic><topic>key agreement protocol</topic><topic>key replicating attack</topic><topic>Public key</topic><topic>Public key cryptography</topic><toplevel>online_resources</toplevel><creatorcontrib>Mengbo Hou</creatorcontrib><creatorcontrib>Qiuliang Xu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Mengbo Hou</au><au>Qiuliang Xu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol</atitle><btitle>2009 Asia-Pacific Conference on Information Processing</btitle><stitle>APCIP</stitle><date>2009-07</date><risdate>2009</risdate><volume>2</volume><spage>574</spage><epage>577</epage><pages>574-577</pages><isbn>9780769536996</isbn><isbn>0769536999</isbn><abstract>Authenticated key agreement protocol is crucial in providing data confidentiality and integrity to subsequent communications among two or more parties over a public network. Certificateless public key cryptography (CL-PKC) combines the advantage of the identity-based public key cryptography (ID-PKC) and the traditional PKI. In 2007, Y.J Shi and J.H Li proposed a two-party authenticated key agreement protocol based on the certificateless encryption scheme proposed by B. Libert and J.J. Quisquater. It is found that the scheme is vulnerable to the key replicating attack (one form of the man-in-the-middle attack), so it doesnpsilat possess the security attribute of implicit key authentication and key control. We analyze such an attack of this protocol in the BR93 model in detail, and demonstrate that the protocol is not secure if the adversary is allowed to send a reveal query to reveal non-partner players who had accepted the same session key.</abstract><pub>IEEE</pub><doi>10.1109/APCIP.2009.277</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9780769536996 |
ispartof | 2009 Asia-Pacific Conference on Information Processing, 2009, Vol.2, p.574-577 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5197264 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Authentication certificateless-based cryptography Computer science Cryptographic protocols Data privacy identity-based cryptography Identity-based encryption implicit key authentication Information processing Information security key agreement protocol key replicating attack Public key Public key cryptography |
title | Key Replicating Attack on Certificateless Authenticated Key Agreement Protocol |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T13%3A00%3A57IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Key%20Replicating%20Attack%20on%20Certificateless%20Authenticated%20Key%20Agreement%20Protocol&rft.btitle=2009%20Asia-Pacific%20Conference%20on%20Information%20Processing&rft.au=Mengbo%20Hou&rft.date=2009-07&rft.volume=2&rft.spage=574&rft.epage=577&rft.pages=574-577&rft.isbn=9780769536996&rft.isbn_list=0769536999&rft_id=info:doi/10.1109/APCIP.2009.277&rft_dat=%3Cieee_6IE%3E5197264%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i175t-4114ae7735542fcd04def3febcdb5dca8c5bc5e90f3f302c6a076019693d206e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5197264&rfr_iscdi=true |