Security properties of two authenticated conference key agreement protocols

被引:0
|
作者
Tang, Q [1 ]
Mitchell, CJ [1 ]
机构
[1] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme suffers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still suffers from insider attacks (which are not covered by the security model used by Katz and Yung).
引用
收藏
页码:304 / 314
页数:11
相关论文
共 50 条
  • [21] On the Security of Certificateless Authenticated Key Agreement Protocol
    Hou Meng-bo
    Xu Qiu-liang
    [J]. 2009 IEEE INTERNATIONAL SYMPOSIUM ON IT IN MEDICINE & EDUCATION, VOLS 1 AND 2, PROCEEDINGS, 2009, : 974 - 979
  • [22] A New Security Model for Authenticated Key Agreement
    Sarr, Augustin P.
    Elbaz-Vincent, Philippe
    Bajard, Jean-Claude
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 219 - +
  • [23] Tripartite authenticated key agreement protocols from pairings
    Al-Riyami, SS
    Paterson, KG
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 332 - 359
  • [24] A Survey of Authenticated Key Agreement Protocols for Securing IoT
    Mohammad, Zeyad
    Abusukhon, Ahmad
    Abu Qattam, Thaer
    [J]. 2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 425 - 430
  • [25] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [26] New secure explicitly authenticated key agreement protocols
    Abouelseoud, Y.
    Nabil, M.
    [J]. IAENG TRANSACTIONS ON ENGINEERING SCIENCES, 2014, : 357 - 368
  • [27] Certificate-Based Authenticated Key Agreement Protocols
    Nabil, Mohamed
    Abouelseoud, Yasmine
    Elkobrosy, Galal
    Abdelrazek, Amr
    [J]. 2013 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS TECHNOLOGY (ICCAT), 2013,
  • [28] Two improved two-party identity-based authenticated key agreement protocols
    Holbl, Marko
    Welzer, Tatjana
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1056 - 1060
  • [29] Two-party certificateless authenticated key agreement protocol with enhanced security
    Tao, Wu
    Xiaojun, Jing
    [J]. Journal of China Universities of Posts and Telecommunications, 2019, 26 (01): : 12 - 20
  • [30] Two-party certificateless authenticated key agreement protocol with enhanced security
    Wu Tao
    Jing Xiaojun
    [J]. The Journal of China Universities of Posts and Telecommunications, 2019, 26 (01) : 12 - 20