CryptoDB
A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Authors: | |
---|---|
Download: | |
Abstract: | Very recently, Jung, Paeng and Kim [IEEE Communications Letters, Vol 8, No 7, pp 446--448, July 2004] have demonstrated the insecurity of Xu and Tilborg's ID-based conference key distribution scheme, and in addition, have revised the scheme to fix the security flaws discovered by them. However, in this paper, we show that Jung-Paeng-Kim's revised scheme is still insecure since it is vulnerable to an active attack of colluding adversaries. We also show that our attack can be easily thwarted by a simple patch. |
BibTeX
@misc{eprint-2004-12225, title={A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme}, booktitle={IACR Eprint archive}, keywords={cryptographic protocols / Conference key distribution; active attack; colluding adversaries.}, url={http://eprint.iacr.org/2004/257}, note={ jhnam@dosan.skku.ac.kr 12759 received 5 Oct 2004, last revised 7 Dec 2004}, author={Junghyun Nam and Seungjoo Kim and Dongho Won}, year=2004 }