Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols

Junghyun Nam, Seungjoo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

A group key agreement protocol is designed to allow a group of parties communicating over an insecure, public network to agree on a common secret key. Recently, in WISA'04, Ren et al. proposed an efficient group key agreement scheme for dynamic groups, which can be built on any of secure two-party key establishment protocols. In the present work we study the main EGAKA-KE protocol of the scheme and point out a critical security flaw in the protocol. We show that the security flaw leads to a vulnerability to an active attack mounted by two colluding adversaries.

Original languageEnglish
Title of host publicationInformation Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers
Pages1-9
Number of pages9
Publication statusPublished - 2005
Event6th International Workshop on Information Security Applications, WISA 2005 - Jeju Island, Korea, Republic of
Duration: 2005 Aug 222005 Aug 24

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3786 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Workshop on Information Security Applications, WISA 2005
CountryKorea, Republic of
CityJeju Island
Period05/8/2205/8/24

Keywords

  • Collusion attack
  • Group key agreement
  • Key authentication

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols'. Together they form a unique fingerprint.

  • Cite this

    Nam, J., Kim, S., & Won, D. (2005). Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols. In Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers (pp. 1-9). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3786 LNCS).