Title: Cryptanalysis of certificateless authenticated key agreement protocols
Authors: Runzhi Zeng; Libin Wang
Addresses: School of Computer, South China Normal University, Guangzhou, Guangdong Province, China ' School of Computer, South China Normal University, Guangzhou, Guangdong Province, China
Abstract: In this work, we cryptanalyse two certificateless authenticated key agreement (CL-AKA) protocols, Bala et al. (2018) and Xie et al. (2019), which are recently proposed claiming provable security. Specifically, we show impersonation attacks against the two protocols with successful probability 1 in extended eCK model using at most two queries. Then, the process of our cryptanalysis is abstracted to a general method for cryptanalysing a specific class of CL-AKA protocols which we call linearly-expressible CL-AKA protocol. Our method suggests new security requirements of CL-AKA protocols.
Keywords: certificateless public cryptography; certificateless key agreement; authenticated key agreement; AKA; eCK model; extended eCK model; security analysis; cryptanalysis; without pairing.
DOI: 10.1504/IJAHUC.2020.108582
International Journal of Ad Hoc and Ubiquitous Computing, 2020 Vol.34 No.4, pp.249 - 257
Received: 05 Aug 2019
Accepted: 26 Nov 2019
Published online: 20 Jul 2020 *