Security weakness in an authenticated group key agreement protocol in two rounds
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Hwang, Jung Yeon | - |
dc.contributor.author | Choi, Kyu Young | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-09T04:15:33Z | - |
dc.date.available | 2021-09-09T04:15:33Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2008-09-25 | - |
dc.identifier.issn | 0140-3664 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/122696 | - |
dc.description.abstract | Dutta and Barua recently proposed an efficient authenticated group key agreement protocol for dynamic membership. To reduce computation overhead, the protocol makes use of a simplified authentication mechanism such that only two neighbors of a participant check if a message is originated from the participant. In this paper, we show that the authenticated group key agreement protocol has some security breaches caused by the restrictive authentication. In addition, we present a simple method to fix the security breaches and prove its security under the standard assumptions. (C) 2008 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER | - |
dc.subject | EXCHANGE | - |
dc.title | Security weakness in an authenticated group key agreement protocol in two rounds | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1016/j.comcom.2008.07.005 | - |
dc.identifier.scopusid | 2-s2.0-50849104757 | - |
dc.identifier.wosid | 000259945700018 | - |
dc.identifier.bibliographicCitation | COMPUTER COMMUNICATIONS, v.31, no.15, pp.3719 - 3724 | - |
dc.relation.isPartOf | COMPUTER COMMUNICATIONS | - |
dc.citation.title | COMPUTER COMMUNICATIONS | - |
dc.citation.volume | 31 | - |
dc.citation.number | 15 | - |
dc.citation.startPage | 3719 | - |
dc.citation.endPage | 3724 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | EXCHANGE | - |
dc.subject.keywordAuthor | Authentication | - |
dc.subject.keywordAuthor | Group communication | - |
dc.subject.keywordAuthor | Group key agreement | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.