2009
DOI: 10.1016/j.jss.2009.02.006
|View full text |Cite
|
Sign up to set email alerts
|

Security weakness of Tseng’s fault-tolerant conference-key agreement protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…To overcome this drawback, fault-tolerant GKA protocols [10,[20][21][22][23][24] were developed to assure that all malicious participants are excluded from the set of participants and that no honest participants are excluded. Tzeng [20] proposes a polynomial-based method to realize fault-tolerance which requires that each participant create n n-power polynomials, where n is the number of participants, this process results in massive computational cost.…”
Section: Introductionmentioning
confidence: 99%
“…To overcome this drawback, fault-tolerant GKA protocols [10,[20][21][22][23][24] were developed to assure that all malicious participants are excluded from the set of participants and that no honest participants are excluded. Tzeng [20] proposes a polynomial-based method to realize fault-tolerance which requires that each participant create n n-power polynomials, where n is the number of participants, this process results in massive computational cost.…”
Section: Introductionmentioning
confidence: 99%
“…First, we show that ICKAP, together with ACKA operations, provides the same security properties and the same resistance against known attacks in and . Moreover, we prove that ACKA operations are resistant against the attack proposed in .…”
Section: Security Analysismentioning
confidence: 71%
“…The major vulnerability of dynamic groups is shown in . They proposed several attack scenarios for the protocol in .…”
Section: Security Analysismentioning
confidence: 99%
“…Dynamic group operations enables group key agreement protocols to be more efficient during re-generation of group keys. In order to overcome security weaknesses stated in [19], a protocol must ensure forward and backward confidentiality properties. Forward confidentiality property assures that further group keys cannot be computed by a participant who has left the group.…”
Section: Security Of Join and Leave Operationsmentioning
confidence: 99%