Security Weakness in Ren et al.'s Group Key Agreement Scheme Built on Secure Two-Party Protocols.
Junghyun NamSeungjoo KimDongho WonPublished in: WISA (2005)
Keyphrases
- key establishment
- group key agreement
- key management
- sensor networks
- wireless sensor networks
- pairwise
- key distribution
- key agreement protocol
- secret sharing scheme
- secret key
- provably secure
- ad hoc networks
- symmetric key
- diffie hellman
- secure communication
- key agreement
- secret sharing
- security services
- group communication
- sensor nodes
- security protocols
- resource constrained
- key exchange
- end to end
- authenticated key agreement
- blind signature scheme
- authentication scheme
- energy consumption