Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
スポンサーリンク
概要
- 論文の詳細を見る
In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.s modified AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.
- (社)電子情報通信学会の論文
- 2009-10-01
著者
-
Wu Tsu-yang
Department Of Mathematics National Changhua University Of Education
-
TSENG Yuh-Min
Department of Mathematics, National Changhua University of Education
-
Tseng Yuh-min
Department Of Mathematics National Changhua University Of Education
-
Tseng Yuh-min
Department Of Information And Communication Engineering Chao Yang University Of Technology
関連論文
- Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
- Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems (Fundamental Theories)