Paper Title:
Analysis on Security Proof of Two Key Agreement Protocols
  Abstract

Recently, Tseng proposed two group key agreement protocols which are claimed to be provably secure against passive attackers and impersonation attacks over authenticated channel. In each of these works, a security proof of the proposed protocol was presented. In this paper, we revisit Tseng’s security proof and show that the reduction in the proof is invalid. As the replacement, we give a new security proof.

  Info
Periodical
Edited by
Wenya Tian and Linli Xu
Pages
531-535
DOI
10.4028/www.scientific.net/AMR.186.531
Citation
H. H. Zhou, M. H. Zheng, "Analysis on Security Proof of Two Key Agreement Protocols", Advanced Materials Research, Vol. 186, pp. 531-535, 2011
Online since
January 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Qi Xie
Abstract:The aim of self proxy is to protect the signer’s permanent secret key. In 2007, Kim and Chang proposed a self proxy signature scheme. In this...
643
Authors: Jian Hong Zhang, Xue Liu, Cheng Lian Liu
Abstract:Multi-authenticated encryption scheme is message transmission scheme, which sends message in a secure and authentic way, and allows a group...
111
Authors: Yong Quan Cai, Fu Lai Cheng
Abstract:The traditional threshold signature scheme is a combination of the digital signature scheme and the secret sharing scheme. Any group of t...
49
Authors: Long Zhang, Shu Yi Lu
Chapter 7: Intelligent Mechatronics
Abstract:Combining the mechanism of the hash chain with the forward-secure proxy blind signature, we firstly propose a new strong forward-secure proxy...
1391
Authors: Xing Xing Jia, Dao Shun Wang, Yu Jiang Wu
Chapter 8: Software, Communication and Computer Applications in Industry and Engineering
Abstract:Publicly verifiable secret sharing schemes based on Lagrange interpolation utilize public cryptography to encrypt transmitted data and the...
1945