Weaknesses in the Hur-Shin-Yoon decentralized group key management

Jung Yeon Hwang, Ji Young Chun, Dong Hoon Lee

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

Recently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography.We show that the GKM scheme unfortunately does not provide data confidentiality.We also present a counter measure to fix the security breaches.

Original languageEnglish
Pages (from-to)1565-1571
Number of pages7
JournalWireless Communications and Mobile Computing
Volume9
Issue number12
DOIs
Publication statusPublished - 2009 Dec

Keywords

  • Backward secrecy
  • Decentralized group key management
  • Forward secrecy

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Weaknesses in the Hur-Shin-Yoon decentralized group key management'. Together they form a unique fingerprint.

  • Cite this