Analysis and improvement of a new authenticated group key agreement in a mobile environment

被引:13
|
作者
Cheng, Qing-Feng [1 ]
Ma, Chuan-Gui [1 ]
Wei, Fu-Shan [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
Group key agreement; Bilinear pairings; Computational Diffie-Hellman problem; Impersonation attack;
D O I
10.1007/s12243-010-0213-z
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In 2009, Lee et al. (Ann Telecommun 64: 735-744, 2009) proposed a new authenticated group key agreement protocol for imbalanced wireless networks. Their protocol based on bilinear pairing was proven the security under computational Diffie-Hellman assumption. It remedies the security weakness of Tseng's nonauthenticated protocol that cannot ensure the validity of the transmitted messages. In this paper, the authors will show that Lee et al.'s authenticated protocol also is insecure. An adversary can impersonate any mobile users to cheat the powerful node. Furthermore, the authors propose an improvement of Lee et al.'s protocol and prove its security in the Manulis et al.'s model. The new protocol can provide mutual authentication and resist ephemeral key compromise attack via binding user's static private key and ephemeral key.
引用
收藏
页码:331 / 337
页数:7
相关论文
共 50 条
  • [1] Analysis and improvement of a new authenticated group key agreement in a mobile environment
    Qing-Feng Cheng
    Chuan-Gui Ma
    Fu-Shan Wei
    [J]. annals of telecommunications - annales des télécommunications, 2011, 66 : 331 - 337
  • [2] A new authenticated group key agreement in a mobile environment
    Lee, Cheng-Chi
    Lin, Tsung-Hung
    Tsai, Chwei-Shyong
    [J]. ANNALS OF TELECOMMUNICATIONS, 2009, 64 (11-12) : 735 - 744
  • [3] A new authenticated group key agreement in a mobile environment
    Cheng-Chi Lee
    Tsung-Hung Lin
    Chwei-Shyong Tsai
    [J]. annals of telecommunications - annales des télécommunications, 2009, 64
  • [4] A novel authenticated group key agreement protocol for mobile environment
    Jia-Lun Tsai
    [J]. annals of telecommunications - annales des télécommunications, 2011, 66 : 663 - 669
  • [5] A provable authenticated group key agreement protocol for mobile environment
    Sun, Hung-Min
    He, Bing-Zhe
    Chen, Chien-Ming
    Wu, Tsu-Yang
    Lin, Chia-Hsien
    Wang, Huaxiong
    [J]. INFORMATION SCIENCES, 2015, 321 : 224 - 237
  • [7] An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks
    Zhang Qikun
    Zhang Quanxin
    Ma Zhongmei
    Tan Yu'an
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (04) : 827 - 835
  • [8] An Authenticated Asymmetric Group Key Agreement for Imbalanced Mobile Networks
    ZHANG Qikun
    ZHANG Quanxin
    MA Zhongmei
    TAN Yu'an
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 827 - 835
  • [9] An improvement on authenticated key agreement scheme
    Chang, Chin-Chen
    Lin, Shih-Yi
    [J]. 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT PERVASIVE COMPUTING, PROCEEDINGS, 2007, : 3 - +
  • [10] Improvement of an Authenticated Key Agreement Protocol
    Zhang, Yongping
    Wei, Wei
    Cao, Tianjie
    [J]. ADVANCES IN WEB AND NETWORK TECHNOLOGIES, AND INFORMATION MANAGEMENT, PROCEEDINGS, 2007, 4537 : 593 - 601