메뉴 건너뛰기




Volumn E89-A, Issue 1, 2006, Pages 213-218

Weakness in Jung et al.'s ID-based conference key distribution scheme

Author keywords

Conference key distribution; Implicit key authentication; Parallel session attack

Indexed keywords

COMPUTER SCIENCE; IDENTIFICATION (CONTROL SYSTEMS); SECURITY SYSTEMS;

EID: 32244449022     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e89-a.1.213     Document Type: Article
Times cited : (2)

References (23)
  • 1
    • 0033748607 scopus 로고    scopus 로고
    • New multiparty authentication services and key agreement protocols
    • April
    • G. Ateniese, M. Steiner, and G. Tsudik, "New multiparty authentication services and key agreement protocols," IEEE J. Sel. Areas Commun., vol. 18, no.4, pp.628-639, April 2000.
    • (2000) IEEE J. Sel. Areas Commun. , vol.18 , Issue.4 , pp. 628-639
    • Ateniese, G.1    Steiner, M.2    Tsudik, G.3
  • 2
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated key exchange secure against dictionary attacks
    • Advances in Cryptology, Eurocrypt'00
    • M. Bellare, D. Pointcheval, and P. Rogaway, "Authenticated key exchange secure against dictionary attacks," Advances in Cryptology, Eurocrypt'00, LNCS 1807, pp.139-155, 2000.
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology, Crypto'93
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," Advances in Cryptology, Crypto'93, LNCS 773, pp.232-249, 1993.
    • (1993) LNCS , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 35248878662 scopus 로고    scopus 로고
    • Round-optimal contributory conference key agreement
    • Proc. 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2003)
    • C. Boyd and J.M.G. Nieto, "Round-optimal contributory conference key agreement," Proc. 6th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2003), LNCS 2567, pp.161-174, 2003.
    • (2003) LNCS , vol.2567 , pp. 161-174
    • Boyd, C.1    Nieto, J.M.G.2
  • 6
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology, Eurocrypt 2001
    • R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," Advances in Cryptology, Eurocrypt 2001, LNCS 2045, pp.453-474, 2001.
    • (2001) LNCS , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 7
    • 0028378975 scopus 로고
    • Identity-based conference key broadcast schemes with user authentication
    • J.L. Chen and T. Hwang, "Identity-based conference key broadcast schemes with user authentication," Comput. Secur., vol.13, no.1, pp.53-57, 1994.
    • (1994) Comput. Secur. , vol.13 , Issue.1 , pp. 53-57
    • Chen, J.L.1    Hwang, T.2
  • 9
    • 32244443990 scopus 로고
    • An improved identity-based one-way conference key sharing system
    • IEEE Press
    • T. Chikazawa and A. Yamagishi, "An improved identity-based one-way conference key sharing system," Proc. ICCS/ISITA'92, vol.1, pp.270-273, IEEE Press, 1992.
    • (1992) Proc. ICCS/ISITA'92 , vol.1 , pp. 270-273
    • Chikazawa, T.1    Yamagishi, A.2
  • 10
    • 1542593353 scopus 로고
    • Authentication and authenticated key exchanges
    • W. Diffie, P. Oorschot, and M. Wiener, "Authentication and authenticated key exchanges," Des. Codes Cryptogr., vol.2, no.2, pp.107-125, 1992.
    • (1992) Des. Codes Cryptogr. , vol.2 , Issue.2 , pp. 107-125
    • Diffie, W.1    Oorschot, P.2    Wiener, M.3
  • 11
    • 0027615034 scopus 로고
    • ID-based cryptographic schemes for user identification, digital signature, and key distribution
    • L. Harn and S. Yang, "ID-based cryptographic schemes for user identification, digital signature, and key distribution," IEEE J. Sel. Areas Commun., vol. 11, no.5, pp.757-760, 1993.
    • (1993) IEEE J. Sel. Areas Commun. , vol.11 , Issue.5 , pp. 757-760
    • Harn, L.1    Yang, S.2
  • 13
    • 3543038203 scopus 로고    scopus 로고
    • Attacks to Xu-Tilborg's conference key distribution scheme
    • B. Jung, S. Paeng, and D. Kim, "Attacks to Xu-Tilborg's conference key distribution scheme," IEEE Commun. Lett., vol.8, no.7, pp.446-448, 2004.
    • (2004) IEEE Commun. Lett. , vol.8 , Issue.7 , pp. 446-448
    • Jung, B.1    Paeng, S.2    Kim, D.3
  • 14
    • 84955559079 scopus 로고    scopus 로고
    • Authenticated multi-party key agreement
    • Advances in Cryptology, Asiacrypt'96
    • M. Just and S. Vaudenay, "Authenticated multi-party key agreement," Advances in Cryptology, Asiacrypt'96, LNCS 1163, pp.36-49, 1996.
    • (1996) LNCS , vol.1163 , pp. 36-49
    • Just, M.1    Vaudenay, S.2
  • 15
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Advances in Cryptology, Crypto'03, Aug.
    • J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," Advances in Cryptology, Crypto'03, LNCS 2729, pp.110-125, Aug. 2003.
    • (2003) LNCS , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 16
    • 19644371756 scopus 로고    scopus 로고
    • A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
    • J. Nam, S. Kim, and D. Won, "A weakness in the Bresson-Chevassut- Essiari-Pointcheval's group key agreement scheme for low-power mobile devices," IEEE Commun. Lett., vol.9, no.5, pp.429-431, 2005.
    • (2005) IEEE Commun. Lett. , vol.9 , Issue.5 , pp. 429-431
    • Nam, J.1    Kim, S.2    Won, D.3
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Advances in Cryptology, Crypto'84
    • A. Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology, Crypto'84, LNCS 196, pp.47-53, 1984.
    • (1984) LNCS , vol.196 , pp. 47-53
    • Shamir, A.1
  • 19
    • 0037352978 scopus 로고    scopus 로고
    • Some attacks on Chikazawa-Yamagishi ID-based key sharing scheme
    • K. Shim, "Some attacks on Chikazawa-Yamagishi ID-based key sharing scheme," IEEE Commun. Lett., vol.7, no.3, pp.145-147, 2003.
    • (2003) IEEE Commun. Lett. , vol.7 , Issue.3 , pp. 145-147
    • Shim, K.1
  • 20
    • 84957810610 scopus 로고
    • Cryptanalysis of several conference key distribution schemes
    • Advances in Cryptology, Asiacrypt'91
    • A. Shimbo and S. Kawamura, "Cryptanalysis of several conference key distribution schemes," Advances in Cryptology, Asiacrypt'91, LNCS 739, pp.265-276, 1993.
    • (1993) LNCS , vol.739 , pp. 265-276
    • Shimbo, A.1    Kawamura, S.2
  • 22
    • 84863285641 scopus 로고
    • Attack on the Koyama-Ohta identity based key distribution scheme
    • Advances in Cryptology, Crypto'87
    • Y. Yacobi, "Attack on the Koyama-Ohta identity based key distribution scheme," Advances in Cryptology, Crypto'87, LNCS 293, pp.429-433, 1988.
    • (1988) LNCS , vol.293 , pp. 429-433
    • Yacobi, Y.1
  • 23
    • 3042717133 scopus 로고    scopus 로고
    • Attack on an ID-based authenticated group key agreement scheme from PKC 2004
    • F. Zhang and X. Chen, "Attack on an ID-based authenticated group key agreement scheme from PKC 2004," Inf. Process. Lett., vol.91, pp.191-193, 2004.
    • (2004) Inf. Process. Lett. , vol.91 , pp. 191-193
    • Zhang, F.1    Chen, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.