An Improvement Over Lee et al.'s Key Agreement Protocol

سال انتشار: 1397
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 154

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_JCSE-5-1_002

تاریخ نمایه سازی: 21 فروردین 1400

چکیده مقاله:

In 2004, Hwang et al. proposed a group key exchange protocol for sharing a secure key in a group. Their protocol is an extension from the two party key exchange protocol to the group one. Recently, Jung-San Lee et al. noted that Hwang et al. group key exchange protocol has two security weaknesses. First, the forward secrecy is not confirmed in case that a new member joins the group and second, if a group member leaves the group, the backward secrecy is compromised. They proposed an improvement over this key exchange protocol in order to provide both forward and backward secrecy among group members. In this paper, we propose another improvement over Lee et al. key exchange, and we show that our key exchange protocol not only preservers both forward and backward secrecy, but also it is more efficient than their protocol when a member leaves the group. Finally, we give a formal analysis for the correctness of the proposed protocol via Scyther model checking tool.

نویسندگان

Hossein Oraei

Department of Mathematical Sciences, Iran University of Science & Technology, Tehran, Iran.

Mohsen Pourpouneh

Department of Mathematical Sciences, Sharif University of Technology, Tehran, Iran.

Rasoul Ramezanian

Department of Mathematical Sciences, Ferdowsi University of Mashhad, Mashhad, Iran.

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on ...
  • L. Harn and C. Lin. Authenticated group key transfer protocol based on ...
  • I. Ingemarsson, D. Tang, and C. Wong. A conference key distribution system. IEEE ...
  • D. G. Steer, L. Strawczynski, W. Diffie, and M. Wiener. A secure audio teleconference ...
  • M. Burmester and Y. Desmedt. A secure and efficient conference key distribution ...
  • M. Steiner, G. Tsudik, and M. Waidner. Diffie-Hellman key distribution extended to group ...
  • E. Bresson, O. Chevassut, D. Pointcheval, and J. Jacques Quisquater. Provably authenticated group Diffie-Hellman ...
  • Jens-Matthias Bohli. A framework for robust group key agreement. In ...
  • E. Bresson, O. Chevassut, D. Pointcheval, and J.-J Quisquater. Provably authenticated group Diffie-Hellman ...
  • J. Katz and M. Yung. Scalable protocols for authenticated group key exchange. ...
  • A. Mayer and M. Yung. Secure protocol transformation via “expansion”: from two-party ...
  • J.Y. Hwang, S.M. Lee, and D.H. Lee. Scalable key exchange ...
  • J. S Lee, C. C Chang, and K. J Wei. Provably secure conference ...
  • C. Boyd and A. Mathuria. Protocols for authentication and key establishment. Springer, ...
  • M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. ...
  • Adrian Perrig. Efficient collaborative key management protocols for secure autonomous ...
  • Cas J. F. Cremers. The Scyther Tool: Verification, falsification, and analysis ...
  • C. Cremers, , and S. Mauw. Operational semantics and verification of security ...
  • نمایش کامل مراجع