Analysis of an efficient group key agreement protocol

Su Mi Lee, Dong Hoon Lee

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)


Recently, Jung [1] proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders.

Original languageEnglish
Pages (from-to)638-639
Number of pages2
JournalIEEE Communications Letters
Issue number8
Publication statusPublished - 2006 Aug

Bibliographical note

Funding Information:
Manuscript received March 9, 2006. The associate editor coordinating the review of this letter and approving it for publication was Dr. Nikos Nikolaou. This work was supported by grant No.R01-2004-000-10704-0 from the Korea Science and Engineering Foundation. The authors are with the Graduate School of Information Security, CIST, Korea University, Seoul, Korea (email: Digital Object Identifier 10.1109/LCOMM.2006.060346.


  • Conference key
  • Fault tolerance
  • Malicious insider

ASJC Scopus subject areas

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Analysis of an efficient group key agreement protocol'. Together they form a unique fingerprint.

Cite this