Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Security weakness in an authenticated group key agreement protocol in two rounds

Full metadata record
DC Field Value Language
dc.contributor.authorHwang, Jung Yeon-
dc.contributor.authorChoi, Kyu Young-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-09T04:15:33Z-
dc.date.available2021-09-09T04:15:33Z-
dc.date.created2021-06-10-
dc.date.issued2008-09-25-
dc.identifier.issn0140-3664-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/122696-
dc.description.abstractDutta and Barua recently proposed an efficient authenticated group key agreement protocol for dynamic membership. To reduce computation overhead, the protocol makes use of a simplified authentication mechanism such that only two neighbors of a participant check if a message is originated from the participant. In this paper, we show that the authenticated group key agreement protocol has some security breaches caused by the restrictive authentication. In addition, we present a simple method to fix the security breaches and prove its security under the standard assumptions. (C) 2008 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherELSEVIER-
dc.subjectEXCHANGE-
dc.titleSecurity weakness in an authenticated group key agreement protocol in two rounds-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1016/j.comcom.2008.07.005-
dc.identifier.scopusid2-s2.0-50849104757-
dc.identifier.wosid000259945700018-
dc.identifier.bibliographicCitationCOMPUTER COMMUNICATIONS, v.31, no.15, pp.3719 - 3724-
dc.relation.isPartOfCOMPUTER COMMUNICATIONS-
dc.citation.titleCOMPUTER COMMUNICATIONS-
dc.citation.volume31-
dc.citation.number15-
dc.citation.startPage3719-
dc.citation.endPage3724-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusEXCHANGE-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorGroup communication-
dc.subject.keywordAuthorGroup key agreement-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE