2007
DOI: 10.1093/ietfec/e90-a.11.2624
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis of an ID-Based Key Agreement for Peer Group Communication

Abstract: SUMMARYPairing based cryptography has been researched intensively due to its beneficial properties. In 2005, Wu et al. [3] proposed an identity-based key agreement for peer group communication from pairings. In this letter, we propose attacks on their scheme, by which the group fails to agree upon a common communication key.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2008
2008
2013
2013

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…Computationally efficient, but vulnerable against impersonation attack [34] The second category of pairing-based key-agreement schemes are based on the Burmester and Desmedt (BD) one [35]. Presenting two separated schemes in two rounds to acquire two identity-based group key-agreement protocols key-agreement protocols.…”
Section: An Overview Of Lightweight Pairing-based Key-agreement Schemesmentioning
confidence: 99%
“…Computationally efficient, but vulnerable against impersonation attack [34] The second category of pairing-based key-agreement schemes are based on the Burmester and Desmedt (BD) one [35]. Presenting two separated schemes in two rounds to acquire two identity-based group key-agreement protocols key-agreement protocols.…”
Section: An Overview Of Lightweight Pairing-based Key-agreement Schemesmentioning
confidence: 99%
“…Also based the TGDH tree structure, Wu et al [8] proposed an ID-based authenticated group key agreement protocol, but the protocol is later shown to be vulnerable to the impersonation attack [11]. The attack can cause the group members to not able to agree on a common session key.…”
Section: Related Workmentioning
confidence: 99%
“…It utilized a binary key tree structure and achieves authentication with the ID-based cryptosystem, hence avoids management of certificates. Since then, many ID-based group key exchange protocols [7][8][9][10][11][12][13][14] using bilinear pairings have been proposed. All authors of the protocols above do not analyze whether their protocol can resist the attack of ephemeral private key revealing or not, and all these protocols utilize the bilinear pairings which have an expensive cost when computed.…”
Section: Introductionmentioning
confidence: 99%