Analysis of an efficient group key agreement protocol

Su Mi Lee, Dong Hoon Lee

Research output: Contribution to journalArticle

3 Citations (Scopus)

Abstract

Recently, Jung [1] proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders.

Original languageEnglish
Pages (from-to)638-639
Number of pages2
JournalIEEE Communications Letters
Volume10
Issue number8
DOIs
Publication statusPublished - 2006 Aug 1

Fingerprint

Group Key Agreement
Key Agreement Protocol
Attack

Keywords

  • Conference key
  • Fault tolerance
  • Malicious insider

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Analysis of an efficient group key agreement protocol. / Lee, Su Mi; Lee, Dong Hoon.

In: IEEE Communications Letters, Vol. 10, No. 8, 01.08.2006, p. 638-639.

Research output: Contribution to journalArticle

@article{5094fef54a44491cb225a7d03e12d738,
title = "Analysis of an efficient group key agreement protocol",
abstract = "Recently, Jung [1] proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders.",
keywords = "Conference key, Fault tolerance, Malicious insider",
author = "Lee, {Su Mi} and Lee, {Dong Hoon}",
year = "2006",
month = "8",
day = "1",
doi = "10.1109/LCOMM.2006.1665136",
language = "English",
volume = "10",
pages = "638--639",
journal = "IEEE Communications Letters",
issn = "1089-7798",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "8",

}

TY - JOUR

T1 - Analysis of an efficient group key agreement protocol

AU - Lee, Su Mi

AU - Lee, Dong Hoon

PY - 2006/8/1

Y1 - 2006/8/1

N2 - Recently, Jung [1] proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders.

AB - Recently, Jung [1] proposed an efficient group key agreement protocol over authenticated channel. In this letter, we present a critique of the protocol. In particular, we show that Jung's protocol is vulnerable to attacks of malicious insiders.

KW - Conference key

KW - Fault tolerance

KW - Malicious insider

UR - http://www.scopus.com/inward/record.url?scp=33747593308&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33747593308&partnerID=8YFLogxK

U2 - 10.1109/LCOMM.2006.1665136

DO - 10.1109/LCOMM.2006.1665136

M3 - Article

AN - SCOPUS:33747593308

VL - 10

SP - 638

EP - 639

JO - IEEE Communications Letters

JF - IEEE Communications Letters

SN - 1089-7798

IS - 8

ER -