首页> 外文期刊>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences >ID-Based Authenticated Group Key Agreement Secure against Insider Attacks
【24h】

ID-Based Authenticated Group Key Agreement Secure against Insider Attacks

机译:基于ID的经过身份验证的组密钥协议可防止内部攻击

获取原文
获取原文并翻译 | 示例

摘要

In 2004, Choi et al. proposed an ID-based authenticated group key agreement. Unfortunately, their protocol was found to be vulnerable to the insider attacks by Zhang, Chen and Shim. To prevent insider attacks, Shim presented a modification of Choi et al.'s protocol. In this letter, we first show that Shim's modification is still insecure against insider attacks. We then present a modification of Choi et al.'s protocol that resists insider attacks. The counter-measure uses an ID-based signature on transcripts in order to bind them in a session. This prevents any replay of transcripts. Especially, by applying ID-based batch verification, the proposed one still consists of two rounds and is computationally efficient.
机译:2004年,Choi等人。提出了一个基于ID的认证组密钥协议。不幸的是,他们的协议被发现容易受到Zhang,Chen和Shim的内部攻击。为了防止内部攻击,Shim提出了Choi等人协议的一种修改。在这封信中,我们首先表明,Shim的修改仍然无法抵御内部攻击。然后,我们提出了Choi等人的协议的一种改进方案,可以抵御内部攻击。应对措施是在笔录上使用基于ID的签名,以便将其绑定到会话中。这样可以防止任何成绩单重播。特别是,通过应用基于ID的批量验证,所提出的验证仍然包括两轮,并且计算效率高。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号