Cryptanalysis of Lee et al.'s authenticated group key agreement

被引:1
|
作者
Yuan, Wei [1 ]
Hu, Liang [1 ]
Li, Hongtu [1 ]
Chu, Jianfeng [1 ]
机构
[1] Jilin Univ, Coll Comp Sci & Technol, Changchun 130012, Peoples R China
来源
CEIS 2011 | 2011年 / 15卷
关键词
Identity-based; Key agreement; Authentication; Bilinear pairing; mobile communications; GROUP-ORIENTED AUTHENTICATION;
D O I
10.1016/j.proeng.2011.08.263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key agreement protocols are to authenticate the users who will start a conversation and establish a common session key. In 2009, Cheng-chi Lee et al. proposed a new authenticated group key agreement based on a novel bilinear pairing to provide integrity of the transmitted messages. In this paper, we show that Cheng-chi Lee et al.'s protocol can only ensure the validity between the second step and the third step, and the intermediate message between the first step and the second step can be disturbed by attackers. That is, Cheng-chi Lee et al.'s protocol doesn't achieve their goal. (C) 2011 Published by Elsevier Ltd. Selection and/or peer-review under responsibility of [CEIS 2011]
引用
收藏
页数:5
相关论文
共 50 条
  • [41] An authenticated group key agreement for wireless networks
    Tan, CH
    Teo, JCM
    2005 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: WCNC 2005: BROADBAND WIRELESS FOR THE MASSES READY FOR TAKE-OFF., 2005, : 2100 - 2105
  • [42] Lee et al. reply
    Jin Hyung Lee
    Remy Durand
    Viviana Gradinaru
    Feng Zhang
    Inbal Goshen
    Dae-Shik Kim
    Lief E. Fenno
    Charu Ramakrishnan
    Karl Deisseroth
    Nature, 2010, 468 (7323) : E4 - E5
  • [43] In Regard to Lee et al.
    Eriguchi, Takahisa
    Takeda, Atsuya
    Kimura, Yuto
    Sanuki, Naoko
    International Journal of Radiation Oncology Biology Physics, 2021, 111 (04): : 1088 - 1089
  • [44] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [45] Comment on Lee et al.
    Yung, Alison R.
    Lin, Ashleigh
    Cotter, Jack
    Wood, Stephen
    SCHIZOPHRENIA RESEARCH, 2014, 159 (01) : 253 - 253
  • [46] Comment on Lee et al.'s group signature and e-auction scheme
    Sun, Yanbin
    Sun, Yan
    Luo, Mingxing
    Gu, Lize
    Zheng, Shihui
    Yang, Yixian
    INFORMATION SYSTEMS FRONTIERS, 2013, 15 (01) : 133 - 139
  • [47] Comment on Lee et al.’s group signature and e-auction scheme
    Yanbin Sun
    Yan Sun
    Mingxing Luo
    Lize Gu
    Shihui Zheng
    Yixian Yang
    Information Systems Frontiers, 2013, 15 : 133 - 139
  • [48] Cryptanalysis on Cheng et al. Protocol
    Thakur, Tejeshwari
    INNOVATIONS THROUGH MATHEMATICAL AND STATISTICAL RESEARCH: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES AND STATISTICS (ICMSS2016), 2016, 1739
  • [49] Reply to Rao et al. and Lee et al
    Sproat R.
    Computational Linguistics, 2010, 36 (04) : 807 - 816
  • [50] Improvement of Tseng et al.'s authenticated encryption scheme
    Hwang, SJ
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 165 (01) : 1 - 4