Advanced Search
Volume 35 Issue 9
Sep.  2013
Turn off MathJax
Article Contents
Hu Xue-Xian, Wei Jiang-Hong, Ye Mao. Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol[J]. Journal of Electronics & Information Technology, 2013, 35(9): 2278-2282. doi: 10.3724/SP.J.1146.2012.01380
Citation: Hu Xue-Xian, Wei Jiang-Hong, Ye Mao. Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol[J]. Journal of Electronics & Information Technology, 2013, 35(9): 2278-2282. doi: 10.3724/SP.J.1146.2012.01380

Cryptanalysis of a Strongly Secure Authenticated Key Exchange Protocol

doi: 10.3724/SP.J.1146.2012.01380
  • Received Date: 2012-10-26
  • Rev Recd Date: 2013-05-30
  • Publish Date: 2013-09-19
  • In the 15th (2012) IACR international conference on practice and theory of Public-Key Cryptography (PKC), Fujioka et al. proposed a generic construction of Authenticated Key Exchange (AKE) from a Key Encapsulation Mechanism (KEM), which is called the GC protocol and is proven to be secure in the CK+ security model. In this paper, it is pointed out by cryptanalysis that the GC protocol is not CK+ secure. Concrete attacks in which the outside adversary, without knowing the static or ephemeral keys of the users, imitates a valid user are also given. Further, the errors in the original security proof are analyzed.
  • Cited by

    Periodical cited type(4)

    1. 赵宗渠,范涛,彭婷婷,叶青,秦攀科. 标准模型下格上的密钥封装机制. 计算机科学与探索. 2019(04): 629-638 .
    2. 王彩芬,陈丽. 基于格的用户匿名三方口令认证密钥协商协议. 通信学报. 2018(02): 21-30 .
    3. 黄益彬,刘强. 安全通信协议设计及其芯片化实现. 电力信息与通信技术. 2015(09): 27-31 .
    4. 杨孝鹏,马文平,张成丽. 一种新型基于环上带误差学习问题的认证密钥交换方案. 电子与信息学报. 2015(08): 1984-1988 . 本站查看

    Other cited types(2)

  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (2992) PDF downloads(1522) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return