Title :
Overcome Weakness of a Password-Based Group Key Agreement Protocol
Author_Institution :
Inst. for Infocomm Res., Singapore
Abstract :
Recently, Kim et al. proposed a very efficient provably secure group key agreement protocol KLL, security of which relies on the computational Diffie-Hellman (CDH) assumption in the presence of random oracles. In our earlier work, we embed the protocol KLL into password-based environment -yielding the protocol DB-PWD. In this paper, we detect certain flaws in the protocol DB-PWD and take suitable measures to overcome these attacks. We introduce a protocol MDB-PWD -an improved variant of the protocol DB-PWD and analyze its security in the security framework formalized by Bellare et al. in both the ideal cipher model and the random oracle model under CDH assumption.
Keywords :
cryptographic protocols; message authentication; private key cryptography; cipher model; computational Diffie-Hellman assumption; password-based group key agreement protocol; random oracle model; secure group key agreement protocol; Concrete; Dictionaries; Electronic mail; Entropy; History; Protocols; Security; Tin;
Conference_Titel :
Computers and Communications, 2007. ISCC 2007. 12th IEEE Symposium on
Conference_Location :
Aveiro
Print_ISBN :
978-1-4244-1520-5
Electronic_ISBN :
1530-1346
DOI :
10.1109/ISCC.2007.4381473