Security weakness in an authenticated group key agreement protocol in two rounds

Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee

Research output: Contribution to journalArticlepeer-review

5 Citations (Scopus)

Abstract

Dutta and Barua recently proposed an efficient authenticated group key agreement protocol for dynamic membership. To reduce computation overhead, the protocol makes use of a simplified authentication mechanism such that only two neighbors of a participant check if a message is originated from the participant. In this paper, we show that the authenticated group key agreement protocol has some security breaches caused by the restrictive authentication. In addition, we present a simple method to fix the security breaches and prove its security under the standard assumptions.

Original languageEnglish
Pages (from-to)3719-3724
Number of pages6
JournalComputer Communications
Volume31
Issue number15
DOIs
Publication statusPublished - 2008 Sept 25

Keywords

  • Authentication
  • Group communication
  • Group key agreement

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Security weakness in an authenticated group key agreement protocol in two rounds'. Together they form a unique fingerprint.

Cite this