Cryptanalysis of Chang-Wu's group-oriented authentication and key exchange protocols

Abstract In 1998, Chang and Wu proposed a group-oriented authentication mechanism with key exchange [Computer Communications 21 (1998) 485–497]. The authors show that the Chang–Wu protocols are vulnerable to the impersonation attack. They also give improvements that can not only eliminate the security flaw, but also reduce the redundant messages inherent in the original protocols.