Authenticated Multi-Party Key Agreement
ASIACRYPT '96 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security
An efficient session key generation for NTDR networks based on bilinear paring
Computer Communications
Security weakness in an authenticated group key agreement protocol in two rounds
Computer Communications
Identity-based constant round group key exchange protocol via secret-share
WSEAS TRANSACTIONS on SYSTEMS
Secure authenticated group key agreement protocol in the MANET environment
Information Security Tech. Report
Constructing UC secure and constant-round group key exchange protocols via secret sharing
EURASIP Journal on Wireless Communications and Networking
ID-Based Authenticated Group Key Agreement Secure against Insider Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
An escrow-less identity-based group-key agreement protocol for dynamic peer groups
International Journal of Security and Networks
Enhancing Security of a Group Key Exchange Protocol for Users with Individual Passwords
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
Secure mobile content delivery using dynamic group key agreement with batch verification
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Efficient cluster-based group key agreement protocols for wireless ad hoc networks
Journal of Network and Computer Applications
Security weakness in ren et al.'s group key agreement scheme built on secure two-party protocols
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.89 |
In PKC'04, Choi, Hwang and Lee [Lecture Notes in Comput. Sci., vol. 2947, Springer-Verlag, 2004, pp. 130-144] proposed two group key agreement schemes from bilinear pairings: one is a bilinear variant of Burmester and Desmedt scheme [Lecture Notes in Comput. Sci., vol. 950, Springer-Verlag, 1994, pp. 267-275] and the other is an ID-based authenticated scheme based on the former. In this paper, we propose an impersonation attack on their ID-based authenticated group key agreement scheme. We show that any two malicious users can impersonate an entity to agree some session keys in a new group if these two malicious users have the previous authentication transcripts of this entity. Therefore, their scheme cannot provide the authenticity as claimed.