首页> 外文期刊>Computer Communications >Security weakness in an authenticated group key agreement protocol in two rounds
【24h】

Security weakness in an authenticated group key agreement protocol in two rounds

机译:经过两轮验证的组密钥协商协议中的安全漏洞

获取原文
获取原文并翻译 | 示例
           

摘要

Dutta and Barua recently proposed an efficient authenticated group key agreement protocol for dynamic membership. To reduce computation overhead, the protocol makes use of a simplified authentication mechanism such that only two neighbors of a participant check if a message is originated from the participant. In this paper, we show that the authenticated group key agreement protocol has some security breaches caused by the restrictive authentication. In addition, we present a simple method to fix the security breaches and prove its security under the standard assumptions.
机译:Dutta和Barua最近提出了一种有效的动态成员身份验证组密钥协议协议。为了减少计算开销,该协议使用简化的身份验证机制,以便仅参与者的两个邻居检查消息是否源自参与者。在本文中,我们证明了已认证的组密钥协商协议由于限制性认证而存在一些安全漏洞。此外,我们提出了一种简单的方法来修复安全漏洞并在标准假设下证明其安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号