Password-based group key exchange secure against insider guessing attacks

Jin Wook Byun, Dong Hoon Lee, Jong In Lim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Abstract

Very recently, Byun and Leo suggested two provably secure group Diffie-Hellman key exchange protocols using n participant's distinct passwords. Unfortunately, the schemes were found to be flawed by Tang and Chen. They presented two password guessing attacks such as off-line and undetectable on-line dictionary attacks by malicious insider attacker. In this paper, we present concrete counterrneasures for two malicious insider attacks, and modify the two group Diffie-Hellman key exchange protocols to bo secure against malicious insider password guessing attacks. Our counterrneasures do not require additional round costs, hence they are efficient.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages143-148
Number of pages6
Volume3802 LNAI
DOIs
Publication statusPublished - 2005 Dec 1
EventInternational Conference on Computational Intelligence and Security, CIS 2005 - Xi'an, China
Duration: 2005 Dec 152005 Dec 19

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3802 LNAI
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

OtherInternational Conference on Computational Intelligence and Security, CIS 2005
CountryChina
CityXi'an
Period05/12/1505/12/19

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Fingerprint Dive into the research topics of 'Password-based group key exchange secure against insider guessing attacks'. Together they form a unique fingerprint.

  • Cite this

    Byun, J. W., Lee, D. H., & Lim, J. I. (2005). Password-based group key exchange secure against insider guessing attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3802 LNAI, pp. 143-148). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3802 LNAI). https://doi.org/10.1007/11596981_21