تعداد نشریات | 43 |
تعداد شمارهها | 1,686 |
تعداد مقالات | 13,791 |
تعداد مشاهده مقاله | 32,397,776 |
تعداد دریافت فایل اصل مقاله | 12,796,078 |
An Improvement Over Lee et al.'s Key Agreement Protocol | |||||||||||||||||||||||||||||||||||||
Journal of Computing and Security | |||||||||||||||||||||||||||||||||||||
مقاله 2، دوره 5، شماره 1، فروردین 2018، صفحه 3-12 اصل مقاله (667.05 K) | |||||||||||||||||||||||||||||||||||||
نوع مقاله: Research Article | |||||||||||||||||||||||||||||||||||||
شناسه دیجیتال (DOI): 10.22108/jcs.2018.106883.0 | |||||||||||||||||||||||||||||||||||||
نویسندگان | |||||||||||||||||||||||||||||||||||||
Hossein Oraei1؛ Mohsen Pourpouneh2؛ Rasoul Ramezanian* 3 | |||||||||||||||||||||||||||||||||||||
1Department of Mathematical Sciences, Iran University of Science & Technology, Tehran, Iran. | |||||||||||||||||||||||||||||||||||||
2Department of Mathematical Sciences, Sharif University of Technology, Tehran, Iran. | |||||||||||||||||||||||||||||||||||||
3Department of Mathematical Sciences, Ferdowsi University of Mashhad, Mashhad, Iran. | |||||||||||||||||||||||||||||||||||||
چکیده | |||||||||||||||||||||||||||||||||||||
In 2004, Hwang et al. proposed a group key exchange protocol for sharing a secure key in a group. Their protocol is an extension from the two party key exchange protocol to the group one. Recently, Jung-San Lee et al. noted that Hwang et al. group key exchange protocol has two security weaknesses. First, the forward secrecy is not confirmed in case that a new member joins the group and second, if a group member leaves the group, the backward secrecy is compromised. They proposed an improvement over this key exchange protocol in order to provide both forward and backward secrecy among group members. In this paper, we propose another improvement over Lee et al. key exchange, and we show that our key exchange protocol not only preservers both forward and backward secrecy, but also it is more efficient than their protocol when a member leaves the group. Finally, we give a formal analysis for the correctness of the proposed protocol via Scyther model checking tool. | |||||||||||||||||||||||||||||||||||||
کلیدواژهها | |||||||||||||||||||||||||||||||||||||
Backward Secrecy؛ Forward Secrecy؛ Group Key Agreement؛ Scyther | |||||||||||||||||||||||||||||||||||||
سایر فایل های مرتبط با مقاله
|
|||||||||||||||||||||||||||||||||||||
مراجع | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
آمار تعداد مشاهده مقاله: 929 تعداد دریافت فایل اصل مقاله: 533 |