Infringing key authentication of an ID-Based group key exchange protocol using binary key trees

被引:0
|
作者
Nam, Junghyun [2 ]
Paik, Juryon [1 ]
Lee, Youngsook [1 ]
Kwak, Jin [3 ]
Kim, Ung Mo [1 ]
Won, Dongho [1 ]
机构
[1] Sungkyunkwan Univ, Dept Comp Engn, Seoul, South Korea
[2] Konkuk Univ, Dept Comp Sci, Seoul, South Korea
[3] Soonchunhyang Univ, Dept Informat Secur, Chungcheongnam Do, South Korea
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Group key exchange protocols allow a group of parties communicating over a public network to come up with a common secret key called a session key. Due to their critical role in building secure multicast channels, a number of group key exchange protocols have been suggested over the years for a variety of settings. Among these is the ID-based group key exchange protocol proposed by Yang and Shieh in 2001. In this paper, we revisit the Yang-Shieh ID-based protocol and conduct a security analysis on the protocol. The consequence of our analysis is that the Yang-Shieh protocol fails to achieve its basic goal of securely establishing a session key among the intended parties. This is shown via a collusion attack on the protocol. We also show how to fix the security problem with the protocol.
引用
收藏
页码:672 / +
页数:2
相关论文
共 50 条
  • [41] An ID-based mutual authentication with key agreement protocol for multiserver environment on elliptic curve cryptosystem
    Han, Weiwei
    Zhu, Zhian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2014, 27 (08) : 1173 - 1185
  • [42] List-Free ID-Based Mutual Authentication and Key Agreement Protocol for Multiserver Architectures
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Tsai, Tung-Tso
    Ke, Jia-Hua
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2016, 4 (01) : 102 - 112
  • [43] A Leakage-Resilient ID-Based Authenticated Key Exchange Protocol With a Revocation Mechanism
    Tsai, Tung-Tso
    Chuang, Yun-Hsin
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Hung, Ying-Hao
    IEEE ACCESS, 2021, 9 : 128633 - 128647
  • [44] An efficient ID-Based authenticated key agreement protocol with pairings
    Oh, Jai-Boo
    Yoon, Eun-Jun
    Yoo, Kee-Young
    PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS, PROCEEDINGS, 2007, 4742 : 446 - 456
  • [45] An efficient secure key issuing protocol in ID-based cryptosystems
    Gangishetti, R
    Gorantla, MC
    Das, ML
    Saxena, A
    Gulati, VP
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 674 - 678
  • [46] Analysis and improvement of an ID-based authenticated key agreement protocol
    Wang, Xiao-Fen
    Chen, Yuan
    Xiao, Guo-Zhen
    Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
  • [47] Strong ID-based key distribution
    Jeong, Ik Rae
    Kwon, Jeong Ok
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (01) : 306 - 308
  • [48] Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2638 - 2640
  • [49] ID-Based one round authenticated group key agreement protocol with bilinear pairings
    Shi, YJ
    Chen, GL
    Li, JH
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 1, 2005, : 757 - 761
  • [50] KEY CHANGEABLE ID-BASED CRYPTOSYSTEM
    KUROSAWA, K
    ELECTRONICS LETTERS, 1989, 25 (09) : 577 - 578