TY - GEN
T1 - Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols
AU - Nam, Junghyun
AU - Kim, Seungjoo
AU - Won, Dongho
PY - 2005
Y1 - 2005
N2 - A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.
AB - A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.
KW - Collusion attack
KW - Group key agreement
KW - Key authentication
UR - http://www.scopus.com/inward/record.url?scp=33744905352&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33744905352&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33744905352
SN - 3540310126
SN - 9783540310129
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1
EP - 9
BT - Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers
T2 - 6th International Workshop on Information Security Applications, WISA 2005
Y2 - 22 August 2005 through 24 August 2005
ER -