Sciweavers

ICICS
2005
Springer

Security Properties of Two Authenticated Conference Key Agreement Protocols

14 years 5 months ago
Security Properties of Two Authenticated Conference Key Agreement Protocols
In this paper we analyse the security of two authenticated group key agreement schemes based on the group key agreement protocol of Burmester and Desmedt. One scheme was proposed by Burmester and Desmedt, and uses a separate authentication scheme to achieve authentication among the participants. We show that this scheme suffers from a number of security vulnerabilities. The other scheme was generated using the general protocol compiler of Katz and Yung. We show that in some circumstances, even if key confirmation is implemented, this scheme still suffers from insider attacks (which are not covered by the security model used by Katz and Yung).
Qiang Tang, Chris J. Mitchell
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where ICICS
Authors Qiang Tang, Chris J. Mitchell
Comments (0)