Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

ID-based authenticated group key agreement secure against insider attacks

Full metadata record
DC Field Value Language
dc.contributor.authorChoi, Kyu Young-
dc.contributor.authorHwang, Jung Yeon-
dc.contributor.authorLee, Dong Hoon-
dc.date.accessioned2021-09-09T07:03:38Z-
dc.date.available2021-09-09T07:03:38Z-
dc.date.created2021-06-10-
dc.date.issued2008-07-
dc.identifier.issn0916-8508-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/123301-
dc.description.abstractIn 2004, Choi et al. proposed an ID-based authenticated group key agreement. Unfortunately, their protocol was found to be vulnerable to the insider attacks by Zhang, Chen and Shim. To prevent insider attacks, Shim presented a modification of Choi et al.'s protocol. In this letter, we first show that Shim's modification is still insecure against insider attacks. We then present a modification of Choi et al.'s protocol that resists insider attacks. The counter-measure uses an ID-based signature on transcripts in order to bind them in a session. This prevents any replay of transcripts. Especially, by applying ID-based batch verification, the proposed one still consists of two rounds and is computationally efficient.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleID-based authenticated group key agreement secure against insider attacks-
dc.typeArticle-
dc.contributor.affiliatedAuthorChoi, Kyu Young-
dc.contributor.affiliatedAuthorHwang, Jung Yeon-
dc.contributor.affiliatedAuthorLee, Dong Hoon-
dc.identifier.doi10.1093/ietfec/e91-a.7.1828-
dc.identifier.scopusid2-s2.0-77951282858-
dc.identifier.wosid000257990300038-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E91A, no.7, pp.1828 - 1830-
dc.relation.isPartOfIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.titleIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.citation.volumeE91A-
dc.citation.number7-
dc.citation.startPage1828-
dc.citation.endPage1830-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorauthenticated group key agreement-
dc.subject.keywordAuthorID-based cryptography-
dc.subject.keywordAuthorinsider attack-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Dong Hoon photo

Lee, Dong Hoon
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE