Infringing key authentication of an ID-Based group key exchange protocol using binary key trees

被引:0
|
作者
Nam, Junghyun [2 ]
Paik, Juryon [1 ]
Lee, Youngsook [1 ]
Kwak, Jin [3 ]
Kim, Ung Mo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
[2] Konkuk Univ, Dept Comp Sci, Seoul, South Korea
[3] Soonchunhyang Univ, Dept Informat Secur, Chungcheongnam Do, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Group key exchange protocols allow a group of parties communicating over a public network to come up with a common secret key called a session key. Due to their critical role in building secure multicast channels, a number of group key exchange protocols have been suggested over the years for a variety of settings. Among these is the ID-based group key exchange protocol proposed by Yang and Shieh in 2001. In this paper, we revisit the Yang-Shieh ID-based protocol and conduct a security analysis on the protocol. The consequence of our analysis is that the Yang-Shieh protocol fails to achieve its basic goal of securely establishing a session key among the intended parties. This is shown via a collusion attack on the protocol. We also show how to fix the security problem with the protocol.
引用
收藏
页码:672 / +
页数:2
相关论文
共 50 条
  • [1] An Efficient ID-Based Authenticated Key Exchange Protocol
    Hu, Xuexian
    Liu, Wenfen
    Zhang, Jianhui
    2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 229 - +
  • [2] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Moon, Jong Sik
    Park, Jong Hyuk
    Lee, Deok Gyu
    Lee, Im-Yeong
    WIRELESS PERSONAL COMMUNICATIONS, 2010, 55 (01) : 91 - 103
  • [3] Authentication and ID-Based Key Management Protocol in Pervasive Environment
    Jong Sik Moon
    Jong Hyuk Park
    Deok Gyu Lee
    Im-Yeong Lee
    Wireless Personal Communications, 2010, 55 : 91 - 103
  • [4] An Improved ID-Based Group Key Agreement Protocol
    Hu, Kangwen
    Xue, Jingfeng
    Hu, Changzhen
    Ma, Rui
    Li, Zhiqiang
    TSINGHUA SCIENCE AND TECHNOLOGY, 2014, 19 (05) : 421 - 428
  • [5] An Improved ID-Based Group Key Agreement Protocol
    Kangwen Hu
    Jingfeng Xue
    Changzhen Hu
    Rui Ma
    Zhiqiang Li
    Tsinghua Science and Technology, 2014, 19 (05) : 421 - 428
  • [6] ID-based key exchange protocol using smart cards with fingerprint
    Bae, HJ
    Kim, HS
    Yoo, KY
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2003, : 448 - 452
  • [8] A new ID-based group key agreement protocol for the network
    Xia, Meichen
    He, Mingxing
    Xie, Liyun
    Journal of Computational Information Systems, 2009, 5 (06): : 1855 - 1860
  • [9] An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    COMPUTER JOURNAL, 2010, 53 (07): : 1062 - 1070
  • [10] A Dynamic ID-based Authenticated Group Key Agreement Protocol
    Zheng, Jun
    Yang, Cheng
    Xue, Jinrong
    Zhang, Can
    PROCEEDINGS OF THE 2015 4TH NATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING ( NCEECE 2015), 2016, 47 : 1079 - 1084