计算机科学
又称作
密码分析
钥匙(锁)
协议(科学)
班级(哲学)
计算机安全
理论计算机科学
加密
人工智能
医学
替代医学
病理
图书馆学
作者
Runzhi Zeng,Libin Wang
出处
期刊:International Journal of Ad Hoc and Ubiquitous Computing
[Inderscience Enterprises Ltd.]
日期:2020-01-01
卷期号:34 (4): 249-249
标识
DOI:10.1504/ijahuc.2020.108582
摘要
In this work, we cryptanalyse two certificateless authenticated key agreement (CL-AKA) protocols, Bala et al. (2018) and Xie et al. (2019), which are recently proposed claiming provable security. Specifically, we show impersonation attacks against the two protocols with successful probability 1 in extended eCK model using at most two queries. Then, the process of our cryptanalysis is abstracted to a general method for cryptanalysing a specific class of CL-AKA protocols which we call linearly-expressible CL-AKA protocol. Our method suggests new security requirements of CL-AKA protocols.
科研通智能强力驱动
Strongly Powered by AbleSci AI