首页> 外文期刊>Information Security Technical Report >An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks
【24h】

An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks

机译:高效的eCK安全无证书认证密钥协议方案,具有针对公钥替换攻击的安全性

获取原文
获取原文并翻译 | 示例
           

摘要

Authenticated Key Agreement (AKA) protocol enables two communicating entities to mutually establish a session key, in such a way that each entity is assured of the authenticity of its peer. Certificateless AKA (CL-AKA) protocols are widely researched, since, it eliminates the key escrow problem in Identity based systems and the cumbersome certificate management overheads associated with the Public Key Infrastructure (PKI) model. However, AKA protocols in the Certificateless setting suffer from public key replacement attacks, since, the user public keys cannot be validated explicitly by certificates. Our investigations reveal that the existing eCK- secure CL-AKA protocols are vulnerable to basic impersonation attacks and Man-in-the-middle attacks by the Key Generation Center (KGC). Moreover, public key replacement attacks by other malicious users can prevent communicating entities from ever agreeing upon a valid session key. In order to mitigate the aforementioned vulnerabilities, we propose the first eCK secure CL-AKA scheme with security against public key replacement attacks by the KGC, as well as, the external adversaries. Contrary to the conventional CL-AKA protocols, the proposed scheme does not have a partial private key escrow at the KGC and does not require secure authenticated channels for the transmission of the partial private keys from the KGC to individual users. Furthermore, we cryptanalyze two of the most recently proposed CL-AKA protocols, to illustrate their lack of eCK security and discuss the flaws in their security proofs. Comparative analysis of the proposed scheme with other CL-AKA protocols in the literature reveals that the proposed scheme offers better efficiency and security. (C) 2019 Elsevier Ltd. All rights reserved.
机译:身份验证密钥协议(AKA)协议使两个通信实体可以相互建立会话密钥,以确保每个实体都具有对等实体的真实性。由于无证书AKA(CL-AKA)协议消除了基于身份的系统中的密钥托管问题以及与公钥基础结构(PKI)模型相关的繁琐的证书管理开销,因此得到了广泛的研究。但是,无证书设置中的AKA协议会遭受公共密钥替换攻击,因为用户公共密钥无法通过证书明确验证。我们的调查表明,现有的eCK安全的CL-AKA协议容易受到密钥生成中心(KGC)的基本模拟攻击和中间人攻击。此外,其他恶意用户的公钥替换攻击可能会阻止通信实体就有效的会话密钥达成一致。为了缓解上述漏洞,我们提出了第一个eCK安全CL-AKA方案,该方案具有针对KGC和外部对手的公钥替换攻击的安全性。与常规的CL-AKA协议相反,所提出的方案在KGC处不具有部分私钥托管,并且不需要用于将部分私钥从KGC传输到各个用户的安全认证信道。此外,我们对两个最近提出的CL-AKA协议进行加密分析,以说明它们缺乏eCK安全性并讨论其安全性证明中的缺陷。对所提方案与其他CL-AKA协议的比较分析表明,所提方案具有更高的效率和安全性。 (C)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号