AN ACTIVE ATTACK ON A DISTRIBUTED GROUP KEY EXCHANGE SYSTEM

被引:1
|
作者
Baouch, Mohamed [1 ]
Antonio Lopez-Ramos, Juan [1 ]
Torrecillas, Blas [1 ]
Schnyder, Reto [2 ]
机构
[1] Univ Almeria, Dept Math, Ctra Sacramento S-N, Almeria 04120, Spain
[2] Univ Zurich, Inst Math, Winterthurerstr 190, CH-8057 Zurich, Switzerland
基金
瑞士国家科学基金会;
关键词
Multiparty key exchange; active attack; AGREEMENT;
D O I
10.3934/amc.2017052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.
引用
收藏
页码:715 / 717
页数:3
相关论文
共 50 条
  • [41] A key management scheme in distributed sensor networks using attack probabilities
    Chan, SP
    Poovendran, R
    Sun, MT
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1007 - 1011
  • [42] Revisiting Key-swapping Collusion Attack on Distributed Sensor Networks
    Thanh Dai Tran
    Agbinya, Johnson I.
    2010 FOURTH INTERNATIONAL CONFERENCE ON SENSOR TECHNOLOGIES AND APPLICATIONS (SENSORCOMM), 2008, : 381 - 388
  • [43] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
  • [44] A collusion attack on pairwise key predistribution schemes for distributed sensor networks
    Moore, T
    FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, : 251 - +
  • [45] Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol
    Ma, Zhiqiang
    He, Jun
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2022, 2022, 13285 : 320 - 337
  • [46] DISTRIBUTED CONTROL IN A KEY TELEPHONE SYSTEM
    KITA, T
    INAGAKI, M
    NITTA, Y
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1985, 3 (04) : 595 - 599
  • [47] Key Exchange Protocol for WSN Resilient against Man in the Middle Attack
    Saqib, Najmus
    2016 IEEE INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTER APPLICATIONS (ICACA), 2016, : 265 - 269
  • [48] Continuous Group Key Agreement with Active Security
    Alwen, Joel
    Coretti, Sandro
    Jost, Daniel
    Mularczyk, Marta
    THEORY OF CRYPTOGRAPHY, TCC 2020, PT II, 2020, 12551 : 261 - 290
  • [49] Computation efficient distributed group key management scheme
    Zhang, Yong
    Zhang, Yi
    Tang, Ye
    Wang, Wei-Nong
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2007, 41 (01): : 60 - 65
  • [50] Distributed multicast routing for efficient group key management
    Felix, JC
    Valli, S
    COMPUTER AND INFORMATION SCIENCES - ISCIS 2003, 2003, 2869 : 747 - 754