Security weakness in an authenticated group key agreement protocol in two rounds

  • Authors:
  • Jung Yeon Hwang;Kyu Young Choi;Dong Hoon Lee

  • Affiliations:
  • Graduate School of Information Management and Security CIST, Korea University 1, 5-Ka, Anam-dong Sungbuk-ku, Seoul 136-701, Republic of Korea;Graduate School of Information Management and Security CIST, Korea University 1, 5-Ka, Anam-dong Sungbuk-ku, Seoul 136-701, Republic of Korea;Graduate School of Information Management and Security CIST, Korea University 1, 5-Ka, Anam-dong Sungbuk-ku, Seoul 136-701, Republic of Korea

  • Venue:
  • Computer Communications
  • Year:
  • 2008

Quantified Score

Hi-index 0.24

Visualization

Abstract

Dutta and Barua recently proposed an efficient authenticated group key agreement protocol for dynamic membership. To reduce computation overhead, the protocol makes use of a simplified authentication mechanism such that only two neighbors of a participant check if a message is originated from the participant. In this paper, we show that the authenticated group key agreement protocol has some security breaches caused by the restrictive authentication. In addition, we present a simple method to fix the security breaches and prove its security under the standard assumptions.