Wei Yuan, Liang Hu, Kuo Zhao, Hongtu Li, Jiang-feng Chu, Yuyu Sun
{"title":"一种高效的基于身份的组密钥协商协议的改进","authors":"Wei Yuan, Liang Hu, Kuo Zhao, Hongtu Li, Jiang-feng Chu, Yuyu Sun","doi":"10.1109/NCIS.2011.53","DOIUrl":null,"url":null,"abstract":"In 2009, Zeng Ping et al. proposed a new Group Key Agreement protocol Based on the ID-AGKA protocol which uses full binary tree structure and each tree node represents a user. Their protocol support users to join or leave the group at any time and the session key will be changed with the users' dynamic changes. In this paper, we point out that Zeng Ping et al.'s Group Key Agreement protocol is non-authenticated and easy to be forged or modified. Then we give a method that attacker can force all group members accepted the modified session private key in BR security model. So, It means that the Zeng Ping et al.'s Protocol can not meet the attribute of implicit key authentication and key control. Finally, we propose an improved protocol to overcome this problem.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Improvement of an Efficient Identity-Based Group Key Agreement Protocol\",\"authors\":\"Wei Yuan, Liang Hu, Kuo Zhao, Hongtu Li, Jiang-feng Chu, Yuyu Sun\",\"doi\":\"10.1109/NCIS.2011.53\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In 2009, Zeng Ping et al. proposed a new Group Key Agreement protocol Based on the ID-AGKA protocol which uses full binary tree structure and each tree node represents a user. Their protocol support users to join or leave the group at any time and the session key will be changed with the users' dynamic changes. In this paper, we point out that Zeng Ping et al.'s Group Key Agreement protocol is non-authenticated and easy to be forged or modified. Then we give a method that attacker can force all group members accepted the modified session private key in BR security model. So, It means that the Zeng Ping et al.'s Protocol can not meet the attribute of implicit key authentication and key control. Finally, we propose an improved protocol to overcome this problem.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.53\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.53","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Improvement of an Efficient Identity-Based Group Key Agreement Protocol
In 2009, Zeng Ping et al. proposed a new Group Key Agreement protocol Based on the ID-AGKA protocol which uses full binary tree structure and each tree node represents a user. Their protocol support users to join or leave the group at any time and the session key will be changed with the users' dynamic changes. In this paper, we point out that Zeng Ping et al.'s Group Key Agreement protocol is non-authenticated and easy to be forged or modified. Then we give a method that attacker can force all group members accepted the modified session private key in BR security model. So, It means that the Zeng Ping et al.'s Protocol can not meet the attribute of implicit key authentication and key control. Finally, we propose an improved protocol to overcome this problem.