Cryptanalysis of Lee et al.'s authenticated group key agreement

被引:1
|
作者
Yuan, Wei [1 ]
Hu, Liang [1 ]
Li, Hongtu [1 ]
Chu, Jianfeng [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
来源
CEIS 2011 | 2011年 / 15卷
关键词
Identity-based; Key agreement; Authentication; Bilinear pairing; mobile communications; GROUP-ORIENTED AUTHENTICATION;
D O I
10.1016/j.proeng.2011.08.263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement protocols are to authenticate the users who will start a conversation and establish a common session key. In 2009, Cheng-chi Lee et al. proposed a new authenticated group key agreement based on a novel bilinear pairing to provide integrity of the transmitted messages. In this paper, we show that Cheng-chi Lee et al.'s protocol can only ensure the validity between the second step and the third step, and the intermediate message between the first step and the second step can be disturbed by attackers. That is, Cheng-chi Lee et al.'s protocol doesn't achieve their goal. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011]
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Cryptanalysis of Alvarez et al. key exchange scheme
    Kamal, Abdel Alim
    Youssef, Amr M.
    INFORMATION SCIENCES, 2013, 223 : 317 - 321
  • [22] Cryptanalysis of Two Tripartite Authenticated Key Agreement Protocols
    Lu, Yang
    Zhang, Quanling
    Li, Jiguo
    14TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS FOR BUSINESS, ENGINEERING AND SCIENCE (DCABES 2015), 2015, : 159 - 162
  • [23] Improvements of Juang et al.'s Pas sword-Authenticated Key Agreement Scheme Using Smart Cards
    Sun, Da-Zhi
    Huai, Jin-Peng
    Sun, Ji-Zhou
    Li, Jian-Xin
    Zhang, Jia-Wan
    Feng, Zhi-Yong
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2009, 56 (06) : 2284 - 2291
  • [24] IMPROVING THE LEE-LEE'S PASSWORD BASED AUTHENTICATED KEY AGREEMENT PROTOCOL
    Yoon, Eun-Jun
    Yoo, Kee-Young
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (08): : 5657 - 5675
  • [25] Further improvement of Juang et al.'s password-authenticated key agreement scheme using smart cards
    He, Debiao
    Chen, Jianhua
    Hu, Jin
    KUWAIT JOURNAL OF SCIENCE & ENGINEERING, 2011, 38 (2A): : 55 - 68
  • [26] Cryptanalysis of an Authenticated Key Agreement Protocol for Wireless Mobile Communications
    He, Debiao
    ETRI JOURNAL, 2012, 34 (03) : 482 - 484
  • [27] Authenticated group key agreement for multicast
    Wang, Liming
    Wu, Chuan-Kun
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 55 - +
  • [28] Authenticated Key Agreement in Group Settings
    李明
    王勇
    谷大武
    白英彩
    Journal of Beijing Institute of Technology(English Edition), 2006, (02) : 186 - 189
  • [29] A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
    Azeem Irshad
    Muhammad Sher
    Omer Nawaz
    Shehzad Ashraf Chaudhry
    Imran Khan
    Saru Kumari
    Multimedia Tools and Applications, 2017, 76 : 16463 - 16489
  • [30] A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme
    Irshad, Azeem
    Sher, Muhammad
    Nawaz, Omer
    Chaudhry, Shehzad Ashraf
    Khan, Imran
    Kumari, Saru
    MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (15) : 16463 - 16489