Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing

被引:4
|
作者
Olimid, Ruxandra E. [1 ]
机构
[1] Univ Bucharest, Dept Comp Sci, Bucharest, Romania
来源
关键词
group key transfer; secret sharing; insider attack; replay attack; cryptanalysis;
D O I
10.12785/amis/070444
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Yuan et al. recently introduced a password-based group key transfer protocol that uses secret sharing, which they claim to be efficient and secure [9]. We remark its resemblance to the construction of Ham and Lin [1], which Nam et al. proved vulnerable to a replay attack [3]. It is straightforward that the same attack can be mount against Yuan et al.'s protocol, proving that the authors' claim is false. In the same paper, Nam et al. propose a countermeasure that may also apply to Yuan et al.'s protocol. However, we show that their protocol remains susceptible to an insider attack (even if it stands against the replay attack): any malicious participant can recover the long-term secret password of any other user and therefore becomes able to compute group keys he is unauthorized to know.
引用
收藏
页码:1585 / 1590
页数:6
相关论文
共 50 条
  • [1] An Efficient Password-based Group Key Exchange Protocol Using Secret Sharing
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (01): : 145 - 150
  • [2] Cryptanalysis and improvement of a password-based key exchange protocol
    Liu, Feng-Mei
    Luo, Shi-Xin
    Ren, Chuan-Lun
    [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 3668 - +
  • [3] Cryptanalysis of an efficient password-based group key agreement protocol
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    [J]. CEIS 2011, 2011, 15
  • [4] Cryptanalysis of a simple three-party password-based key exchange protocol
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2011, 24 (04) : 532 - 542
  • [5] Cryptanalysis of a three-party password-based authenticated key exchange protocol
    [J]. He, D. (hedebiao@163.com), 1600, Femto Technique Co., Ltd. (16):
  • [6] Efficient password-based authenticated group key exchange protocol
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
    不详
    [J]. Dianzi Keji Diaxue Xuebao, 2009, 3 (393-396+414):
  • [7] Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Jeon, Woongryul
    Lee, Byunghee
    Won, Dongho
    [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 309 - +
  • [8] Cryptanalysis and Enhancement of an Efficient and Provably Secure Password-based Group Key Agreement Protocol
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    Yang, Kun
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (11A): : 4507 - 4512
  • [9] Cryptanalysis and Improvement of a Password-Based Authenticated Three-Party Key Exchange Protocol
    Lee, Youngsook
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 151 - 160
  • [10] Efficient password-based group key exchange
    Lee, SM
    Hwang, JY
    Lee, DH
    [J]. TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 191 - 199