Security properties of two authenticated conference key agreement protocols

5Citations
Citations of this article
26Readers
Mendeley users who have this article in their library.

Abstract

In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme suffers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still suffers from insider attacks (which are not covered by the security model used by Katz and Yung). © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Tang, Q., & Mitchell, C. J. (2005). Security properties of two authenticated conference key agreement protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3783 LNCS, pp. 304–314). Springer Verlag. https://doi.org/10.1007/11602897_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free