An Improvement Over Lee et al.'s Key Agreement Protocol

Publish Year: 1397
نوع سند: مقاله ژورنالی
زبان: English
View: 185

This Paper With 10 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

JR_JCSE-5-1_002

تاریخ نمایه سازی: 21 فروردین 1400

Abstract:

In 2004, Hwang et al. proposed a group key exchange protocol for sharing a secure key in a group. Their protocol is an extension from the two party key exchange protocol to the group one. Recently, Jung-San Lee et al. noted that Hwang et al. group key exchange protocol has two security weaknesses. First, the forward secrecy is not confirmed in case that a new member joins the group and second, if a group member leaves the group, the backward secrecy is compromised. They proposed an improvement over this key exchange protocol in order to provide both forward and backward secrecy among group members. In this paper, we propose another improvement over Lee et al. key exchange, and we show that our key exchange protocol not only preservers both forward and backward secrecy, but also it is more efficient than their protocol when a member leaves the group. Finally, we give a formal analysis for the correctness of the proposed protocol via Scyther model checking tool.

Authors

Hossein Oraei

Department of Mathematical Sciences, Iran University of Science & Technology, Tehran, Iran.

Mohsen Pourpouneh

Department of Mathematical Sciences, Sharif University of Technology, Tehran, Iran.

Rasoul Ramezanian

Department of Mathematical Sciences, Ferdowsi University of Mashhad, Mashhad, Iran.

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on ...
  • L. Harn and C. Lin. Authenticated group key transfer protocol based on ...
  • I. Ingemarsson, D. Tang, and C. Wong. A conference key distribution system. IEEE ...
  • D. G. Steer, L. Strawczynski, W. Diffie, and M. Wiener. A secure audio teleconference ...
  • M. Burmester and Y. Desmedt. A secure and efficient conference key distribution ...
  • M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman key distribution extended to group ...
  • E. Bresson, O. Chevassut, D. Pointcheval, and J. Jacques Quisquater. Provably authenticated group Diffie-Hellman ...
  • Jens-Matthias Bohli. A framework for robust group key agreement. In ...
  • E. Bresson, O. Chevassut, D. Pointcheval, and J.-J Quisquater. Provably authenticated group Diffie-Hellman ...
  • J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. ...
  • A. Mayer and M. Yung. Secure protocol transformation via “expansion”: from two-party ...
  • J.Y. Hwang, S.M. Lee, and D.H. Lee. Scalable key exchange ...
  • J. S Lee, C. C Chang, and K. J Wei. Provably secure conference ...
  • C. Boyd and A. Mathuria. Protocols for authentication and key establishment. Springer, ...
  • M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. ...
  • Adrian Perrig. Efficient collaborative key management protocols for secure autonomous ...
  • Cas J. F. Cremers. The Scyther Tool: Verification, falsification, and analysis ...
  • C. Cremers, , and S. Mauw. Operational semantics and verification of security ...
  • نمایش کامل مراجع