Cryptanalysis of a Password-based Group Key Exchange Protocol Using Secret Sharing

被引:4
|
作者
Olimid, Ruxandra E. [1 ]
机构
[1] Univ Bucharest, Dept Comp Sci, Bucharest, Romania
来源
关键词
group key transfer; secret sharing; insider attack; replay attack; cryptanalysis;
D O I
10.12785/amis/070444
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Yuan et al. recently introduced a password-based group key transfer protocol that uses secret sharing, which they claim to be efficient and secure [9]. We remark its resemblance to the construction of Ham and Lin [1], which Nam et al. proved vulnerable to a replay attack [3]. It is straightforward that the same attack can be mount against Yuan et al.'s protocol, proving that the authors' claim is false. In the same paper, Nam et al. propose a countermeasure that may also apply to Yuan et al.'s protocol. However, we show that their protocol remains susceptible to an insider attack (even if it stands against the replay attack): any malicious participant can recover the long-term secret password of any other user and therefore becomes able to compute group keys he is unauthorized to know.
引用
收藏
页码:1585 / 1590
页数:6
相关论文
共 50 条
  • [21] EPA: An efficient password-based protocol for authenticated key exchange
    Hwang, YH
    Yum, DH
    Lee, PJ
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2003, 2727 : 452 - 463
  • [22] Design of a password-based authenticated key exchange protocol for SIP
    Mishra, Dheerendra
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (23) : 16017 - 16038
  • [23] Design of a password-based authenticated key exchange protocol for SIP
    Dheerendra Mishra
    [J]. Multimedia Tools and Applications, 2016, 75 : 16017 - 16038
  • [24] Scalable protocol for cross-domain group password-based authenticated key exchange
    Cong Guo
    Zijian Zhang
    Liehuang Zhu
    Yu-an Tan
    Zhen Yang
    [J]. Frontiers of Computer Science, 2015, 9 : 157 - 169
  • [25] Cryptanalysis of Server-Aided Password-Based Authenticated Key Exchange Protocols
    Nam, Junghyun
    Choo, Kim-Kwang Raymond
    Paik, Juryon
    Won, Dongho
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (02): : 47 - 57
  • [26] Cryptanalysis of an efficient three-party password-based key exchange scheme
    Simplicio, Marcos A., Jr.
    Sakuragui, Rony R. M.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (11) : 1443 - 1449
  • [27] Cryptanalysis of an efficient three-party password-based key exchange scheme
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 3972 - 3979
  • [28] Efficient augmented password-based encrypted key exchange protocol
    Wu, Shuhua
    Zhu, Yuefei
    [J]. MOBILE AD-HOC AND SENSOR NETWORKS, PROCEEDINGS, 2006, 4325 : 533 - +
  • [29] A New Anonymous Password-Based Authenticated Key Exchange Protocol
    Yang, Jing
    Zhang, Zhenfeng
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 200 - 212
  • [30] Simple and Efficient Password-Based Authenticated Key Exchange Protocol
    王立斌
    潘嘉昕
    马昌社
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (04) : 459 - 465