Recently, Choi et al. proposed an ID-based authenticated group key agreement with bilinear maps. Subsequently, Zhang and Chen showed that the protocol does not provide authenticity as claimed by replaying transcripts of the past session. To prevent those replay attacks, they suggest adding a time parameter to the message being signed. However, despite of such a modification, we show that the protocol is still insecure against insider colluding attacks without replaying transcripts of the past session.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Kyung-Ah SHIM, "Further Analysis of ID-Based Authenticated Group Key Agreement Protocol from Bilinear Maps" in IEICE TRANSACTIONS on Fundamentals,
vol. E90-A, no. 1, pp. 295-298, January 2007, doi: 10.1093/ietfec/e90-a.1.295.
Abstract: Recently, Choi et al. proposed an ID-based authenticated group key agreement with bilinear maps. Subsequently, Zhang and Chen showed that the protocol does not provide authenticity as claimed by replaying transcripts of the past session. To prevent those replay attacks, they suggest adding a time parameter to the message being signed. However, despite of such a modification, we show that the protocol is still insecure against insider colluding attacks without replaying transcripts of the past session.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e90-a.1.295/_p
Copy
@ARTICLE{e90-a_1_295,
author={Kyung-Ah SHIM, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Further Analysis of ID-Based Authenticated Group Key Agreement Protocol from Bilinear Maps},
year={2007},
volume={E90-A},
number={1},
pages={295-298},
abstract={Recently, Choi et al. proposed an ID-based authenticated group key agreement with bilinear maps. Subsequently, Zhang and Chen showed that the protocol does not provide authenticity as claimed by replaying transcripts of the past session. To prevent those replay attacks, they suggest adding a time parameter to the message being signed. However, despite of such a modification, we show that the protocol is still insecure against insider colluding attacks without replaying transcripts of the past session.},
keywords={},
doi={10.1093/ietfec/e90-a.1.295},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Further Analysis of ID-Based Authenticated Group Key Agreement Protocol from Bilinear Maps
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 295
EP - 298
AU - Kyung-Ah SHIM
PY - 2007
DO - 10.1093/ietfec/e90-a.1.295
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E90-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2007
AB - Recently, Choi et al. proposed an ID-based authenticated group key agreement with bilinear maps. Subsequently, Zhang and Chen showed that the protocol does not provide authenticity as claimed by replaying transcripts of the past session. To prevent those replay attacks, they suggest adding a time parameter to the message being signed. However, despite of such a modification, we show that the protocol is still insecure against insider colluding attacks without replaying transcripts of the past session.
ER -