Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme(Protocol, <Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In 2000, Xu and Tilborg proposed an ID-based conference key distribution scheme which builds on earlier work of Harn and Yang in the 2-party setting. Recently, Jung et al. have discovered security flaws in the Xu-Tilborg scheme and proposed an improvement of this scheme to fix the security flaws. However, Jung et al.'s improvement introduces another security weakness. We demonstrate this by showing that the improved scheme is vulnerable to a parallel session attack mounted by two colluding adversaries. Further, we recommend changes to the scheme that address this vulnerability.
- 社団法人電子情報通信学会の論文
- 2006-01-01
著者
-
NAM Junghyun
Information Security Group, Sungkyunkwan University
-
Won Dongho
Information Security Group Sungkyunkwan University
-
Won Dongho
Sungkyunkwan Univ. Gyeonggi‐do Kor
-
Won Dongho
School Of Information And Communication Engineering Sungkyunkwan University
-
NAM Junghyun
School of Information and Communication Engineering, Sungkyunkwan University
-
KIM Seungjoo
School of Information and Communication Engineering, Sungkyunkwan University
関連論文
- Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards(Information Security)
- Security Improvement on Wu and Zhu's Protocol for Password-Authenticated Group Key Exchange
- Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme(Protocol, Cryptography and Information Security)
- Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords(Protocol, Cryptography and Information Security)
- Weakness and Improvements of Yong-Lee's Anonymous Fingerprinting Protocol(Digital Signal Processing)
- A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards