Published in

Institute of Electronics, Information and Communication Engineers, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 9(E90-A), p. 1876-1878, 2007

DOI: 10.1093/ietfec/e90-a.9.1876

Links

Tools

Export citation

Search in Google Scholar

Security Analysis of Joint Group Key Agreement Protocol.

Journal article published in 2007 by Chik-How Tan
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Red circle
Preprint: archiving forbidden
Red circle
Postprint: archiving forbidden
Green circle
Published version: archiving allowed
Data provided by SHERPA/RoMEO

Abstract

In a secure group communication, a group key agreement is to provide a secret key exchange among a group of users. When a new user joins the group, a new group key will be established. In this paper, we analyse Horng's joint protocol and show that this protocol does not provide backward secrecy. This means that a new joining user is able to discover the previous group key used by the previous group member.