Security properties of two authenticated conference key agreement protocols

被引:0
|
作者
Tang, Q [1 ]
Mitchell, CJ [1 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme suffers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still suffers from insider attacks (which are not covered by the security model used by Katz and Yung).
引用
收藏
页码:304 / 314
页数:11
相关论文
共 50 条
  • [1] Security weaknesses of authenticated key agreement protocols
    Nose, Peter
    [J]. INFORMATION PROCESSING LETTERS, 2011, 111 (14) : 687 - 696
  • [2] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [3] Security of authenticated multiple-key agreement protocols
    Wu, TS
    He, WH
    Hsu, CL
    [J]. ELECTRONICS LETTERS, 1999, 35 (05) : 391 - 392
  • [4] Security analysis on tripartite authenticated key agreement protocols
    Li Hao
    Dai Jufeng
    Gao Junping
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4653 - +
  • [5] Security analysis of password-authenticated key agreement protocols
    Shim, KA
    Seo, SH
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 49 - 58
  • [6] Security weaknesses of a signature scheme and authenticated key agreement protocols
    Nose, Peter
    [J]. INFORMATION PROCESSING LETTERS, 2014, 114 (03) : 107 - 115
  • [7] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    [J]. 14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [8] Cryptoanalysis on the Forward Security of Two Authenticated Key Protocols
    Cheng Qingfeng
    Ma Yuqian
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (12) : 4294 - 4303
  • [9] Certificateless authenticated two-party key agreement Protocols
    Mandt, Tarjei K.
    Tan, Chik How
    [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2006: SECURE SOFTWARE AND RELATED ISSUES, 2007, 4435 : 37 - 44