{"title":"对恒轮认证组密钥交换方案的攻击","authors":"Li Xin, Jiang Xiao-ning, Ye Cheng-qing","doi":"10.1109/ICICS.2005.1689084","DOIUrl":null,"url":null,"abstract":"A constant-round authenticated group key exchange for dynamic groups scheme has been proposed by Kim et al., (2004). In this paper, an impersonation attack on this scheme is proposed. It shows that any two malicious users can impersonate an honest user to agree some session keys in a new group if these two malicious users have the previous authentication transcripts of this honest user. So, this constant-round authenticated group key exchange scheme can not provide the authenticity as claimed. A proposal to repair this scheme's flaw is proposed in the end","PeriodicalId":425178,"journal":{"name":"2005 5th International Conference on Information Communications & Signal Processing","volume":"356 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack on a Constant-round Authenticated Group Key Exchange Scheme\",\"authors\":\"Li Xin, Jiang Xiao-ning, Ye Cheng-qing\",\"doi\":\"10.1109/ICICS.2005.1689084\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A constant-round authenticated group key exchange for dynamic groups scheme has been proposed by Kim et al., (2004). In this paper, an impersonation attack on this scheme is proposed. It shows that any two malicious users can impersonate an honest user to agree some session keys in a new group if these two malicious users have the previous authentication transcripts of this honest user. So, this constant-round authenticated group key exchange scheme can not provide the authenticity as claimed. A proposal to repair this scheme's flaw is proposed in the end\",\"PeriodicalId\":425178,\"journal\":{\"name\":\"2005 5th International Conference on Information Communications & Signal Processing\",\"volume\":\"356 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 5th International Conference on Information Communications & Signal Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICS.2005.1689084\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 5th International Conference on Information Communications & Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICS.2005.1689084","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
摘要
Kim et al.,(2004)提出了动态组方案的常轮认证组密钥交换。本文提出了一种针对该方案的模拟攻击。它表明,任何两个恶意用户都可以冒充一个诚实用户,在一个新的组中同意一些会话密钥,只要这两个恶意用户拥有这个诚实用户以前的身份验证记录。因此,这种恒轮认证组密钥交换方案不能提供所声称的真实性。最后对该方案的缺陷提出了改进建议
Attack on a Constant-round Authenticated Group Key Exchange Scheme
A constant-round authenticated group key exchange for dynamic groups scheme has been proposed by Kim et al., (2004). In this paper, an impersonation attack on this scheme is proposed. It shows that any two malicious users can impersonate an honest user to agree some session keys in a new group if these two malicious users have the previous authentication transcripts of this honest user. So, this constant-round authenticated group key exchange scheme can not provide the authenticity as claimed. A proposal to repair this scheme's flaw is proposed in the end