English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 6507/11669
造訪人次 : 29620575      線上人數 : 298
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
搜尋範圍 進階搜尋

請使用永久網址來引用或連結此文件: http://ir.ncue.edu.tw/ir/handle/987654321/12167

題名: Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
作者: Wu, Tsu-Yang;Tseng, Yuh-Min
貢獻者: 數學系
關鍵詞: Group key agreement;Insider colluding attack;Batch verification;Forgery attack
日期: 2009
上傳時間: 2012-07-03T03:45:07Z
出版者: IEICE
摘要: In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) protocol using bilinear pairings. Unfortunately, their protocol suffered from an impersonation attack and an insider colluding attack. In 2008, Choi et al. presented an improvement to resist insider attacks. In their modified protocol, they used an ID-based signature scheme on transcripts for binding them in a session to prevent replay of transcripts. In particular, they smartly used the batch verification technique to reduce the computational cost. In this paper, we first show that Choi et al.'s modified AGKA protocol still suffers from an insider colluding attack. Then, we prove that the batch verification of the adopted ID-based signature scheme in their modified protocol suffers from a forgery attack.
關聯: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E92-A(10): 2638-2640
顯示於類別:[數學系] 期刊論文

文件中的檔案:

檔案 大小格式瀏覽次數
2020100910023.pdf25KbAdobe PDF541檢視/開啟


在NCUEIR中所有的資料項目都受到原著作權保護.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - 回饋