메뉴 건너뛰기




Volumn 3786 LNCS, Issue , 2005, Pages 1-9

Security weakness in Ren et al.'s group key agreement scheme built on secure two-party protocols

Author keywords

Collusion attack; Group key agreement; Key authentication

Indexed keywords

COMPUTER CRIME; COMPUTER PRIVACY; COMPUTER SYSTEMS; CRYPTOGRAPHY; DATA PRIVACY; NETWORK PROTOCOLS;

EID: 33744905352     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (18)
  • 3
    • 84945119254 scopus 로고
    • Entity authentication and key distribution
    • Advances in Cryptology - Crypto 1993
    • M. Bellare and P. Rogaway, "Entity authentication and key distribution," In Advances in Cryptology - Crypto 1993, Lecture Notes in Computer Science, vol. 773, pp. 232-249, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 232-249
    • Bellare, M.1    Rogaway, P.2
  • 4
    • 35248878662 scopus 로고    scopus 로고
    • Round-optimal contributory conference key agreement
    • PKC 2003
    • C. Boyd and J.M.G. Nieto, "Round-optimal contributory conference key agreement," In PKC 2003, Lecture Notes in Computer Science, vol. 2567, pp. 161-174, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2567 , pp. 161-174
    • Boyd, C.1    Nieto, J.M.G.2
  • 6
    • 84948991087 scopus 로고
    • A secure and efficient conference key distribution system
    • Advances In Cryptology - Eurocrypt 1994
    • M. Burmester and Y. Desmedt, "A secure and efficient conference key distribution system," In Advances In Cryptology - Eurocrypt 1994, Lecture Notes in Computer Science, vol. 950, pp. 275-286, 1995.
    • (1995) Lecture Notes in Computer Science , vol.950 , pp. 275-286
    • Burmester, M.1    Desmedt, Y.2
  • 7
    • 35048860626 scopus 로고    scopus 로고
    • Analysis of key-exchange protocols and their use for building secure channels
    • Advances in Cryptology - Eurocrypt 2001
    • R. Canetti and H. Krawczyk, "Analysis of key-exchange protocols and their use for building secure channels," In Advances in Cryptology - Eurocrypt 2001, Lecture Notes in Computer Science, vol. 2045, pp. 453-474, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 453-474
    • Canetti, R.1    Krawczyk, H.2
  • 11
    • 84955559079 scopus 로고    scopus 로고
    • Authenticated multi-party key agreement
    • Advances in Cryptology - Asiacrypt 1996
    • M. Just and S. Vaudenay, "Authenticated multi-party key agreement," In Advances in Cryptology - Asiacrypt 1996, LNCS 1163, pp. 36-49, 1996.
    • (1996) LNCS , vol.1163 , pp. 36-49
    • Just, M.1    Vaudenay, S.2
  • 12
    • 35248878854 scopus 로고    scopus 로고
    • Scalable protocols for authenticated group key exchange
    • Advances in Cryptology - Crypto 2003
    • J. Katz and M. Yung, "Scalable protocols for authenticated group key exchange," In Advances in Cryptology - Crypto 2003, Lecture Notes in Computer Science, vol. 2729, pp. 110-125, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 110-125
    • Katz, J.1    Yung, M.2
  • 14
    • 19644371756 scopus 로고    scopus 로고
    • A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices
    • J. Nam, S. Kim, and D. Won, "A weakness in the Bresson-Chevassut-Essiari-Pointcheval's group key agreement scheme for low-power mobile devices," IEEE Communications Letters, vol. 9, no. 5, pp. 429-431, 2005.
    • (2005) IEEE Communications Letters , vol.9 , Issue.5 , pp. 429-431
    • Nam, J.1    Kim, S.2    Won, D.3
  • 16
    • 23944520338 scopus 로고    scopus 로고
    • Efficient authenticated key agreement protocol for dynamic groups
    • 5th International Workshop on Information Security Applications (WISA 2004)
    • K. Ren, H. Lee, K. Kim, and T. Yoo, "Efficient authenticated key agreement protocol for dynamic groups," In 5th International Workshop on Information Security Applications (WISA 2004), Lecture Notes in Computer Science, vol. 3325, pp. 144-159, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3325 , pp. 144-159
    • Ren, K.1    Lee, H.2    Kim, K.3    Yoo, T.4
  • 18
    • 3042717133 scopus 로고    scopus 로고
    • Attack on an ID-based authenticated group key agreement scheme from PKC 2004
    • F. Zhang and X. Chen, "Attack on an ID-based authenticated group key agreement scheme from PKC 2004," Information Processing Letters, vol. 91, no. 4, pp. 191-193, 2004.
    • (2004) Information Processing Letters , vol.91 , Issue.4 , pp. 191-193
    • Zhang, F.1    Chen, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.