Cryptanalysis of Lee et al.'s authenticated group key agreement

被引:1
|
作者
Yuan, Wei [1 ]
Hu, Liang [1 ]
Li, Hongtu [1 ]
Chu, Jianfeng [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
来源
CEIS 2011 | 2011年 / 15卷
关键词
Identity-based; Key agreement; Authentication; Bilinear pairing; mobile communications; GROUP-ORIENTED AUTHENTICATION;
D O I
10.1016/j.proeng.2011.08.263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement protocols are to authenticate the users who will start a conversation and establish a common session key. In 2009, Cheng-chi Lee et al. proposed a new authenticated group key agreement based on a novel bilinear pairing to provide integrity of the transmitted messages. In this paper, we show that Cheng-chi Lee et al.'s protocol can only ensure the validity between the second step and the third step, and the intermediate message between the first step and the second step can be disturbed by attackers. That is, Cheng-chi Lee et al.'s protocol doesn't achieve their goal. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011]
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Improvement on the fault-tolerant group key agreement protocol of Zhao et al.
    Wang, Zhiwei
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (02) : 166 - 170
  • [32] Comment on Xu et al.'s Key Agreement and Password Authentication Protocol
    Guo, Yongning
    Liu, Chenglian
    FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE II, PTS 1-6, 2012, 121-126 : 3847 - +
  • [33] Cryptanalysis of Guo et al.'s three-party password-based authenticated key exchange (G-3PAKE) protocol
    Choi, Sung-Bae
    Yoon, Eun-Jun
    INTERNATIONAL CONFERENCE ON ADVANCES IN ENGINEERING 2011, 2011, 24 : 187 - 191
  • [34] Cryptanalysis of Two Identity-Based Authenticated Key Agreement Protocols
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS LETTERS, 2012, 16 (04) : 554 - 556
  • [35] Cryptanalysis of Xinyu et al.'s NTRU-lattice based key exchange protocol
    Valluri, Maheswara Rao
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (02): : 475 - 479
  • [36] Cryptanalysis of tripartite and multi-party authenticated key agreement protocols
    Shim, Kyung-Ah
    Woo, Sung Sik
    INFORMATION SCIENCES, 2007, 177 (04) : 1143 - 1151
  • [37] Cryptanalysis and Enhancement of Two-pass Authenticated Key Agreement with Key Confirmation Protocols
    Mohammad, Zeyad
    Chen, Yaw-Chung
    Hsu, Chien-Lung
    Lo, Chi-Chun
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 252 - 265
  • [38] An efficient authenticated group key agreement protocol
    He Yong-Zhong
    Han Zhen
    41ST ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2007, : 250 - +
  • [39] Reply to Lee et al.
    Wang, Fei
    Li, Ni
    He, Jie
    AMERICAN JOURNAL OF RESPIRATORY AND CRITICAL CARE MEDICINE, 2023, 207 (03) : 365 - 366
  • [40] Letter to Lee et al.
    A M Heuchan
    R Goldman
    Journal of Perinatology, 2009, 29 (9) : 650 - 650