Skip to main content
Top
Published in: Annals of Telecommunications 5-6/2011

01-06-2011

Analysis and improvement of a new authenticated group key agreement in a mobile environment

Authors: Qing-Feng Cheng, Chuan-Gui Ma, Fu-Shan Wei

Published in: Annals of Telecommunications | Issue 5-6/2011

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In 2009, Lee et al. (Ann Telecommun 64:735–744, 2009) proposed a new authenticated group key agreement protocol for imbalanced wireless networks. Their protocol based on bilinear pairing was proven the security under computational Diffie–Hellman assumption. It remedies the security weakness of Tseng’s nonauthenticated protocol that cannot ensure the validity of the transmitted messages. In this paper, the authors will show that Lee et al.’s authenticated protocol also is insecure. An adversary can impersonate any mobile users to cheat the powerful node. Furthermore, the authors propose an improvement of Lee et al.’s protocol and prove its security in the Manulis et al.’s model. The new protocol can provide mutual authentication and resist ephemeral key compromise attack via binding user’s static private key and ephemeral key.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Boyd C, Nieto JMG (2003) Round-optimal contributory conference key agreement. In: Proceedings of public-key cryptography, pp 161–174 Boyd C, Nieto JMG (2003) Round-optimal contributory conference key agreement. In: Proceedings of public-key cryptography, pp 161–174
2.
go back to reference Bresson E, Chevassut O, Pointcheval D, Quisquater JJ (2001) Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of the 8th ACM conference on computer and communications security (CCS’01), pp 255–264 Bresson E, Chevassut O, Pointcheval D, Quisquater JJ (2001) Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of the 8th ACM conference on computer and communications security (CCS’01), pp 255–264
3.
go back to reference Bresson E, Chevassut O, Pointcheval D (2002) Dynamic group Diffie–Hellman key exchange under standard assumptions. In: Proceeding of advances in cryptology-EUROCRYPT’02, pp 321–336 Bresson E, Chevassut O, Pointcheval D (2002) Dynamic group Diffie–Hellman key exchange under standard assumptions. In: Proceeding of advances in cryptology-EUROCRYPT’02, pp 321–336
4.
go back to reference Bresson E, Manulis M, Schwenk J (2007) On security models and compilers for group key exchange protocols. In: Proceedings of the 2nd international workshop on security (IWSEC 2007), pp 292–307 Bresson E, Manulis M, Schwenk J (2007) On security models and compilers for group key exchange protocols. In: Proceedings of the 2nd international workshop on security (IWSEC 2007), pp 292–307
5.
go back to reference Bresson E, Manulis M (2007) Malicious participants in group key exchange: key control and contributiveness in the shadow of trust. In: Proceedings of the 4th autonomic and trusted computing conference (ATC 2007), pp 395–409 Bresson E, Manulis M (2007) Malicious participants in group key exchange: key control and contributiveness in the shadow of trust. In: Proceedings of the 4th autonomic and trusted computing conference (ATC 2007), pp 395–409
6.
go back to reference Bresson E, Manulis M (2008) Securing group key exchange against strong corruptions. In: Proceedings of ACM symposium on information, computer and communications security (ASIACCS’08), pp 249–260 Bresson E, Manulis M (2008) Securing group key exchange against strong corruptions. In: Proceedings of ACM symposium on information, computer and communications security (ASIACCS’08), pp 249–260
7.
go back to reference Gorantla MC, Boyd C, Gonzalez-Nieto JM (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In: Proceedings of public key cryptography-PKC 2009, pp 105–123 Gorantla MC, Boyd C, Gonzalez-Nieto JM (2009) Modeling key compromise impersonation attacks on group key exchange protocols. In: Proceedings of public key cryptography-PKC 2009, pp 105–123
8.
go back to reference Herranz J, Villar JL (2004) An unbalanced protocol for group key exchange. In: Proceedings of TrustBus 2004, pp 172–180 Herranz J, Villar JL (2004) An unbalanced protocol for group key exchange. In: Proceedings of TrustBus 2004, pp 172–180
9.
go back to reference Katz J, Shin JS (2005) Modeling insider attacks on group key-exchange protocols. In: Proceedings of the 12th ACM conference on computer and communications security (CCS’05), pp 180–189 Katz J, Shin JS (2005) Modeling insider attacks on group key-exchange protocols. In: Proceedings of the 12th ACM conference on computer and communications security (CCS’05), pp 180–189
10.
go back to reference Katz J, Yung M (2003) Scalable protocols for authenticated group key exchange. In: Proceedings of advances in cryptology-crypto’03, pp 110–125 Katz J, Yung M (2003) Scalable protocols for authenticated group key exchange. In: Proceedings of advances in cryptology-crypto’03, pp 110–125
11.
go back to reference Lee C-C, Lin T-H, Tsai C-S (2009) A new authenticated group key agreement in a mobile environment. Ann Telecommun 64:735–744CrossRef Lee C-C, Lin T-H, Tsai C-S (2009) A new authenticated group key agreement in a mobile environment. Ann Telecommun 64:735–744CrossRef
12.
go back to reference Lu R, Cao Z, Su R, Shao J (2005) Pairing-based two-party authenticated key agreement protocol. In: Cryptology ePrint archive, report 354 Lu R, Cao Z, Su R, Shao J (2005) Pairing-based two-party authenticated key agreement protocol. In: Cryptology ePrint archive, report 354
13.
go back to reference Manulis M, Suzuki K, Ustaoglu B (2009) Modeling leakage of ephemeral secrets in tripartite/group key exchange. In: Proceedings of ICISC 2009, pp 16–33 Manulis M, Suzuki K, Ustaoglu B (2009) Modeling leakage of ephemeral secrets in tripartite/group key exchange. In: Proceedings of ICISC 2009, pp 16–33
14.
go back to reference Menezes A, Ustaoglu B (2008) Comparing the pre-and post-specified peer models for key agreement. In: Proceedings of information security and privacy- ACISP 2008, pp 53–68 Menezes A, Ustaoglu B (2008) Comparing the pre-and post-specified peer models for key agreement. In: Proceedings of information security and privacy- ACISP 2008, pp 53–68
15.
go back to reference Nam J, Lee J, Kim S, Won D (2005) DDH-based group key agreement in a mobile environment. J Syst Softw 78(1):73–83CrossRef Nam J, Lee J, Kim S, Won D (2005) DDH-based group key agreement in a mobile environment. J Syst Softw 78(1):73–83CrossRef
16.
go back to reference Tseng Y-M (2007) A resource-constrained group key agreement protocol for imbalanced wireless networks. Comput Secur 26(4):331–337CrossRef Tseng Y-M (2007) A resource-constrained group key agreement protocol for imbalanced wireless networks. Comput Secur 26(4):331–337CrossRef
Metadata
Title
Analysis and improvement of a new authenticated group key agreement in a mobile environment
Authors
Qing-Feng Cheng
Chuan-Gui Ma
Fu-Shan Wei
Publication date
01-06-2011
Publisher
Springer-Verlag
Published in
Annals of Telecommunications / Issue 5-6/2011
Print ISSN: 0003-4347
Electronic ISSN: 1958-9395
DOI
https://doi.org/10.1007/s12243-010-0213-z

Other articles of this Issue 5-6/2011

Annals of Telecommunications 5-6/2011 Go to the issue

Premium Partner