首页> 外文会议>Italian Workshop on Neural Networks >Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees
【24h】

Infringing Key Authentication of an ID-Based Group Key Exchange Protocol Using Binary Key Trees

机译:使用二进制关键树侵犯基于ID的组密钥交换协议的关键身份验证

获取原文

摘要

Group key exchange protocols allow a group of parties communicating over a public network to come up with a common secret key called a session key. Due to their critical role in building secure multicast channels, a number of group key exchange protocols have been suggested over the years for a variety of settings. Among these is the ID-based group key exchange protocol proposed by Yang and Shieh in 2001. In this paper, we revisit the Yang-Shieh ID-based protocol and conduct a security analysis on the protocol. The consequence of our analysis is that the Yang-Shieh protocol fails to achieve its basic goal of securely establishing a session key among the intended parties. This is shown via a collusion attack on the protocol. We also show how to fix the security problem with the protocol.
机译:组密钥交换协议允许一组缔约方通过公共网络通信,提出称为会话密钥的共同密钥。由于它们在构建安全多播信道中的关键作用,多年来已经提出了许多组密钥交换协议,以获得各种设置。其中是2001年杨和谢赫提出的基于ID的基于群体关键交流协议。在本文中,我们重新审视基于杨氏ID的议定书,并对协议进行安全分析。我们分析的结果是,杨氏议定书未能达到核心建立预期缔约方之间的会话关键的基本目标。这通过对协议的勾结攻击显示。我们还展示了如何使用协议修复安全问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号