DocumentCode
2078239
Title
Overcome Weakness of a Password-Based Group Key Agreement Protocol
Author
Dutta, Ratna
Author_Institution
Inst. for Infocomm Res., Singapore
fYear
2007
fDate
1-4 July 2007
Firstpage
469
Lastpage
474
Abstract
Recently, Kim et al. proposed a very efficient provably secure group key agreement protocol KLL, security of which relies on the computational Diffie-Hellman (CDH) assumption in the presence of random oracles. In our earlier work, we embed the protocol KLL into password-based environment -yielding the protocol DB-PWD. In this paper, we detect certain flaws in the protocol DB-PWD and take suitable measures to overcome these attacks. We introduce a protocol MDB-PWD -an improved variant of the protocol DB-PWD and analyze its security in the security framework formalized by Bellare et al. in both the ideal cipher model and the random oracle model under CDH assumption.
Keywords
cryptographic protocols; message authentication; private key cryptography; cipher model; computational Diffie-Hellman assumption; password-based group key agreement protocol; random oracle model; secure group key agreement protocol; Concrete; Dictionaries; Electronic mail; Entropy; History; Protocols; Security; Tin;
fLanguage
English
Publisher
ieee
Conference_Titel
Computers and Communications, 2007. ISCC 2007. 12th IEEE Symposium on
Conference_Location
Aveiro
ISSN
1530-1346
Print_ISBN
978-1-4244-1520-5
Electronic_ISBN
1530-1346
Type
conf
DOI
10.1109/ISCC.2007.4381473
Filename
4381473
Link To Document