Security analysis and improvements of hierarchical identity based authenticated key agreement scheme

Research output: Contribution to journalArticlepeer-review

Abstract

The security of hierarchical identity based authenticated key agreement scheme which was proposed by CAO et al. (2014) is cryptanalyzed. First, it is pointed out that the scheme is not completely secure against the basic impersonation attack. Then, the process and the reasons of the attack are described. Finally, an improvement scheme to mend the security leaks is proposed based on the hierarchical identity based encryption (BONEH et al.2005). The security proof of the proposal is presented in the BJM model. The computation efficiency of the proposed scheme is nearly equivalent to the CAO et al.'s.

Original languageEnglish
Pages (from-to)2619-2626
Number of pages8
JournalDianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology
Volume38
Issue number10
DOIs
StatePublished - 1 Oct 2016

Keywords

  • Authenticated key agreement
  • Cryptography
  • Hierarchical identity based cryptography
  • Provable security

Fingerprint

Dive into the research topics of 'Security analysis and improvements of hierarchical identity based authenticated key agreement scheme'. Together they form a unique fingerprint.

Cite this