Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols

Junghyun Nam, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.

Original languageEnglish
Title of host publicationInformation Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers
Pages1-9
Number of pages9
Publication statusPublished - 2005
Externally publishedYes
Event6th International Workshop on Information Security Applications, WISA 2005 - Jeju Island, Korea, Republic of
Duration: 2005 Aug 222005 Aug 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3786 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Workshop on Information Security Applications, WISA 2005
Country/TerritoryKorea, Republic of
CityJeju Island
Period05/8/2205/8/24

Keywords

  • Collusion attack
  • Group key agreement
  • Key authentication

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols'. Together they form a unique fingerprint.

Cite this