The security of hierarchical identity based authenticated key agreement scheme which was proposed by CAO et al. (2014) is cryptanalyzed. First, it is pointed out that the scheme is not completely secure against the basic impersonation attack. Then, the process and the reasons of the attack are described. Finally, an improvement scheme to mend the security leaks is proposed based on the hierarchical identity based encryption (BONEH et al. 2005). The security proof of the proposal is presented in the BJM model. The computation efficiency of the proposed scheme is nearly equivalent to the CAO et al.’s.
BONEH D and FRANKLIN M. Identity-based encryption from the Weil pairing[C]. Proceedings of 21st Annual International Cryptology Conference, Santa Barbara, California, USA, 2001: 213-229.
[2]
SHAMIR A. Identity-based cryptosystems and signature schemes[C]. Proceedings of 4rd Annual International Cryptology Conference, Santa Barbara, California, USA, 1984: 47-53.
XIA S, QUAN J, and HAN W. Provably secure identity-based authenticated key agreement protocols in multiple PKG environment[J]. Journal of Electronics & Information Technology, 2010, 32(10): 2393-2399. doi: 10.3724/SP.J.1146.2009.01382.
CAO X, KOU W, Fan K, et al. An identity-based authenticated key agreement protocol without bilinear pairing[J]. Journal of Electronics & Information Technology, 2009, 31(5): 1241-1244. doi: 10.3724/SP.J.1146.2008.00003.
[5]
HORWITZ J and LYNN B. Toward hierarchical identity-based encryption[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, Netherland, 2002: 466-481.
[6]
GENTRY C and SILVERBERG A. Hierarchical ID-based cryptography[C]. Proceedings of 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, 2002: 548-566.
[7]
BONEH D, BOYEN X, and GOH E. Hierarchical identity based encryption with constant size ciphertext[C]. Proceedings of 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 2005: 440-456.
[8]
GUO H, MU Y, LI Z, et al. An efficient and non-interactive hierarchical key agreement protocol[J]. Computers & Security, 2011, 30(1): 28-34.
CAO C, LIU M, ZHANG R, et al. Provably secure authenticated key agreement protocol based on hierarchical identity[J]. Journal of Electronics & Information Technology, 2014, 36(12): 2848-2854. doi: 10.3724/SP.J.1146.2014.00684.
[10]
IBRIQ J and MAHGOUB I. HIKES: hierarchical key establishment scheme for wireless sensor networks[J]. International Journal of Communication Systems, 2014, 27(10): 1825-1856.
[11]
LIU W, LIU J, WU Q, et al. SAKE: scalable authenticated key exchange for mobile e-health networks[OL]. http://onlinelibrary.wiley.com/doi/10.1002/sec.1198/abstract, 2015.
[12]
KIM H. Freshness-preserving non-interactive hierarchical key agreement protocol over WHMS[J]. Sensors, 2014, 14(12): 23742-23757. doi: 10.3390/s141223742.
[13]
GOLDWASSER S and MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
[14]
BELLARE M and PHILLIP R. Random oracles are practical: a paradigm for designing efficient protocols[C]. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA, 1993: 62-73.
[15]
BELLARE M and PHILLIP R. Entity authentication and key distribution[C]. Proceedings of 13th Annual International Cryptology Conference, Santa Barbara, California, USA, 1993: 232-249.
[16]
BLAKE-WILSON S, JOHNSON D, and MENEZES A. Key agreement protocols and their security analysis[C]. Proceedings of 6th IMA International Conference, Cirencester, UK, 2005: 30-45.
[17]
LAMACCHIA B, LAUTER K, and MITYAGIN A. Stronger security of authenticated key exchange[C]. Proceedings of First International Conference ProvSec, Wollongong, Australia, 2007: 1-16.
[18]
CHEN L, CHENG Z, and SMART N. Identity-based key agreement protocols from pairings[J]. International Journal of Information Security, 2007, 6(4): 213-241.
NI L, CHEN G, and LI J. Security analysis of the eCK model[J]. Journal of Shandong University (Natural Science), 2013, 48(7): 46-48.
[20]
FUJIOKA A, SUZUKI K, XAGAWA K, et al. Strongly secure authenticated key exchange from factoring, codes, and lattices[C]. Proceedings of 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, 2012: 467-484.
[21]
BONEH D and BOYEN X. Efficient selective-ID secure identity-based encryption without random oracles[C]. Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, 2004: 223-238.
[22]
ZHU G, XIONG H, and QIN Z. On the security of an efficient and non-interactive hierarchical key agreement protocol[J]. Wireless Personal Communications, 2014, 74(2): 883-889.
WEI J, LIU W, and HU X. Provable secure attribute based authenticated key exchange protocols in the standard model[J]. Journal of Software, 2014, 25(10): 2397-2408.
[24]
DENG H, WU Q, QIN B, et al. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts[J]. Information Sciences, 2014, 275: 370-384.
[25]
LYNN B. On the implementation of pairing-based cryptosystems[D]. [Ph.D. dissertation], Stanford University, 2007.