Weaknesses in the Hur-Shin-Yoon decentralized group key management

Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Recently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography.We show that the GKM scheme unfortunately does not provide data confidentiality.We also present a counter measure to fix the security breaches.

Original languageEnglish
Pages (from-to)1565-1571
Number of pages7
JournalWireless Communications and Mobile Computing
Volume9
Issue number12
DOIs
Publication statusPublished - 2009 Dec 1

Fingerprint

Cryptography

Keywords

  • Backward secrecy
  • Decentralized group key management
  • Forward secrecy

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Information Systems

Cite this

Weaknesses in the Hur-Shin-Yoon decentralized group key management. / Hwang, Jung Yeon; Chun, Ji Young; Lee, Dong Hoon.

In: Wireless Communications and Mobile Computing, Vol. 9, No. 12, 01.12.2009, p. 1565-1571.

Research output: Contribution to journalArticle

@article{61874a21acdf4f7e90530b4df57414d3,
title = "Weaknesses in the Hur-Shin-Yoon decentralized group key management",
abstract = "Recently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography.We show that the GKM scheme unfortunately does not provide data confidentiality.We also present a counter measure to fix the security breaches.",
keywords = "Backward secrecy, Decentralized group key management, Forward secrecy",
author = "Hwang, {Jung Yeon} and Chun, {Ji Young} and Lee, {Dong Hoon}",
year = "2009",
month = "12",
day = "1",
doi = "10.1002/wcm.741",
language = "English",
volume = "9",
pages = "1565--1571",
journal = "Wireless Communications and Mobile Computing",
issn = "1530-8669",
publisher = "John Wiley and Sons Ltd",
number = "12",

}

TY - JOUR

T1 - Weaknesses in the Hur-Shin-Yoon decentralized group key management

AU - Hwang, Jung Yeon

AU - Chun, Ji Young

AU - Lee, Dong Hoon

PY - 2009/12/1

Y1 - 2009/12/1

N2 - Recently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography.We show that the GKM scheme unfortunately does not provide data confidentiality.We also present a counter measure to fix the security breaches.

AB - Recently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography.We show that the GKM scheme unfortunately does not provide data confidentiality.We also present a counter measure to fix the security breaches.

KW - Backward secrecy

KW - Decentralized group key management

KW - Forward secrecy

UR - http://www.scopus.com/inward/record.url?scp=72949087944&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=72949087944&partnerID=8YFLogxK

U2 - 10.1002/wcm.741

DO - 10.1002/wcm.741

M3 - Article

AN - SCOPUS:72949087944

VL - 9

SP - 1565

EP - 1571

JO - Wireless Communications and Mobile Computing

JF - Wireless Communications and Mobile Computing

SN - 1530-8669

IS - 12

ER -