Recently, to provide data confidentiality against intermediate relaying proxies, Hur, Shin, and Yoon proposed a decentralized group key management(GKM) scheme for dynamic networks that uses proxy cryptography.We show that the GKM scheme unfortunately does not provide data confidentiality.We also present a counter measure to fix the security breaches.
- Backward secrecy
- Decentralized group key management
- Forward secrecy
ASJC Scopus subject areas
- Information Systems
- Computer Networks and Communications
- Electrical and Electronic Engineering