2005
DOI: 10.1093/ietfec/e88-a.10.2762
|View full text |Cite
|
Sign up to set email alerts
|

Identity-Based Key Agreement for Peer Group Communication from Pairings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2007
2007
2011
2011

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(7 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…In this letter, we have shown that Wu et al's ID-based key agreement for peer group communication is not as secure as stated by the authors [3]. Our proposed attacks, such as an impersonation attack and a modification of z i attack, compromised Wu et al's scheme, causing the group to fail to agree upon a common communication key.…”
Section: Discussionmentioning
confidence: 73%
See 3 more Smart Citations
“…In this letter, we have shown that Wu et al's ID-based key agreement for peer group communication is not as secure as stated by the authors [3]. Our proposed attacks, such as an impersonation attack and a modification of z i attack, compromised Wu et al's scheme, causing the group to fail to agree upon a common communication key.…”
Section: Discussionmentioning
confidence: 73%
“…In 2005, Wu et al [3] proposed an identity-based key agreement for peer group communication from pairings. In this letter, we propose attacks on their scheme, by which the group fails to agree upon a common communication key.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…It utilized a binary key tree structure and achieves authentication with the ID-based cryptosystem, hence avoids management of certificates. Since then, many ID-based group key exchange protocols [7][8][9][10][11][12][13][14] using bilinear pairings have been proposed. All authors of the protocols above do not analyze whether their protocol can resist the attack of ephemeral private key revealing or not, and all these protocols utilize the bilinear pairings which have an expensive cost when computed.…”
Section: Introductionmentioning
confidence: 99%