Analysis of an efficient group key agreement protocol

Su Mi Lee, Dong Hoon Lee

    Research output: Contribution to journalArticlepeer-review

    3 Citations (Scopus)

    Abstract

    Recently, Jung [1] proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders.

    Original languageEnglish
    Pages (from-to)638-639
    Number of pages2
    JournalIEEE Communications Letters
    Volume10
    Issue number8
    DOIs
    Publication statusPublished - 2006 Aug

    Bibliographical note

    Funding Information:
    Manuscript received March 9, 2006. The associate editor coordinating the review of this letter and approving it for publication was Dr. Nikos Nikolaou. This work was supported by grant No.R01-2004-000-10704-0 from the Korea Science and Engineering Foundation. The authors are with the Graduate School of Information Security, CIST, Korea University, Seoul, Korea (email: [email protected]). Digital Object Identifier 10.1109/LCOMM.2006.060346.

    Keywords

    • Conference key
    • Fault tolerance
    • Malicious insider

    ASJC Scopus subject areas

    • Modelling and Simulation
    • Computer Science Applications
    • Electrical and Electronic Engineering

    Fingerprint

    Dive into the research topics of 'Analysis of an efficient group key agreement protocol'. Together they form a unique fingerprint.

    Cite this