English  |  正體中文  |  简体中文  |  Items with full text/Total items : 6469/11641
Visitors : 16915117      Online Users : 83
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search
LoginUploadHelpAboutAdminister

Please use this identifier to cite or link to this item: http://ir.ncue.edu.tw/ir/handle/987654321/12167

Title: Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
Authors: Wu, Tsu-Yang;Tseng, Yuh-Min
Contributors: 數學系
Keywords: Group key agreement;Insider colluding attack;Batch verification;Forgery attack
Date: 2009
Issue Date: 2012-07-03T03:45:07Z
Publisher: IEICE
Abstract: In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.'s modified AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.
Relation: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E92-A(10): 2638-2640
Appears in Collections:[數學系] 期刊論文

Files in This Item:

File SizeFormat
2020100910023.pdf25KbAdobe PDF411View/Open


All items in NCUEIR are protected by copyright, with all rights reserved.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback