Abstract
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme suffers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still suffers from insider attacks (which are not covered by the security model used by Katz and Yung). © Springer-Verlag Berlin Heidelberg 2005.
Cite
CITATION STYLE
Tang, Q., & Mitchell, C. J. (2005). Security properties of two authenticated conference key agreement protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3783 LNCS, pp. 304–314). Springer Verlag. https://doi.org/10.1007/11602897_26
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.