Provably authenticated group Diffie-Hellman key exchange
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Round-Optimal Contributory Conference Key Agreement
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
Some attacks upon authenticated group key agreement protocols
Journal of Computer Security - Special issue on CSFW14
Attack on an ID-based authenticated group key agreement scheme from PKC 2004
Information Processing Letters
Constant round dynamic group key agreement
ISC'05 Proceedings of the 8th international conference on Information Security
A conference key distribution system
IEEE Transactions on Information Theory
Secure group key management for storage area networks
IEEE Communications Magazine
Hi-index | 0.24 |
Dutta and Barua recently proposed an efficient authenticated group key agreement protocol for dynamic membership. To reduce computation overhead, the protocol makes use of a simplified authentication mechanism such that only two neighbors of a participant check if a message is originated from the participant. In this paper, we show that the authenticated group key agreement protocol has some security breaches caused by the restrictive authentication. In addition, we present a simple method to fix the security breaches and prove its security under the standard assumptions.