Security

Improved ID-Based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Free registration required

Executive Summary

Many conference systems over the Internet require authenticated group key agreement (AGKA) for secure and reliable communication. After Shamir proposed the ID-based cryptosystem in 1984, ID-based AGKA protocols have been actively studied because of the simple public key management. In 2006, Zhou et al. proposed two-round ID-based AGKA protocol which is very efficient in communication and computation complexity. However, their protocol does not provide user identification and suffers from the impersonation attack by malicious participants.

  • Format: PDF
  • Size: 160.5 KB