ID-based authenticated group key agreement secure against insider attacks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Choi, Kyu Young | - |
dc.contributor.author | Hwang, Jung Yeon | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-09T07:03:38Z | - |
dc.date.available | 2021-09-09T07:03:38Z | - |
dc.date.created | 2021-06-10 | - |
dc.date.issued | 2008-07 | - |
dc.identifier.issn | 0916-8508 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/123301 | - |
dc.description.abstract | In 2004, Choi et al. proposed an ID-based authenticated group key agreement. Unfortunately, their protocol was found to be vulnerable to the insider attacks by Zhang, Chen and Shim. To prevent insider attacks, Shim presented a modification of Choi et al.'s protocol. In this letter, we first show that Shim's modification is still insecure against insider attacks. We then present a modification of Choi et al.'s protocol that resists insider attacks. The counter-measure uses an ID-based signature on transcripts in order to bind them in a session. This prevents any replay of transcripts. Especially, by applying ID-based batch verification, the proposed one still consists of two rounds and is computationally efficient. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | ID-based authenticated group key agreement secure against insider attacks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Choi, Kyu Young | - |
dc.contributor.affiliatedAuthor | Hwang, Jung Yeon | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1093/ietfec/e91-a.7.1828 | - |
dc.identifier.scopusid | 2-s2.0-77951282858 | - |
dc.identifier.wosid | 000257990300038 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E91A, no.7, pp.1828 - 1830 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.title | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.volume | E91A | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 1828 | - |
dc.citation.endPage | 1830 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | authenticated group key agreement | - |
dc.subject.keywordAuthor | ID-based cryptography | - |
dc.subject.keywordAuthor | insider attack | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.