Contributory group key exchange in the presence of malicious participants

被引:16
|
作者
Bresson, E. [1 ]
Manulis, M. [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Louvain, Belgium
关键词
D O I
10.1049/iet-ifs:20070113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol's output: misbehaving participants might have personal advantage in influencing the value of the group key. In fact, the absence of trust relationship is the main feature of GKE (when compared with group key transport) protocols. The existing notions of security are enlarged by identifying limitations in some previously proposed security models while taking into account different types of corruptions (weak and strong). To illustrate these notions, two efficient and provably secure generic solutions, compilers, are presented.
引用
收藏
页码:85 / 93
页数:9
相关论文
共 50 条
  • [1] Malicious participants in group key exchange: Key control and contributiveness in the shadow of trust
    Bresson, Emmanuel
    Manulis, Mark
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 395 - +
  • [2] Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    INFORMATICA, 2012, 23 (02) : 315 - 334
  • [3] A revocable ID-based authenticated group key exchange protocol with resistant to malicious participants
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    COMPUTER NETWORKS, 2012, 56 (12) : 2994 - 3006
  • [4] A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants
    Wu, Tsu-Yang
    Tsai, Tung-Tso
    Tseng, Yuh-Min
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [5] Contributory Password-Authenticated Group Key Exchange with Join Capability
    Abdalla, Michel
    Chevalier, Celine
    Granboulan, Louis
    Pointcheval, David
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 142 - +
  • [6] UC-secure and Contributory Password-Authenticated Group Key Exchange
    Zhang, Lin
    Zhang, Zhenfeng
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 119 - 134
  • [7] Mining frequent itemsets in the presence of malicious participants
    Sekhavat, Y. A.
    Fathian, M.
    IET INFORMATION SECURITY, 2010, 4 (02) : 80 - 92
  • [8] Two-round contributory group key exchange protocol for wireless network environments
    Tsu-Yang Wu
    Yuh-Min Tseng
    Ching-Wen Yu
    EURASIP Journal on Wireless Communications and Networking, 2011
  • [9] Two-round contributory group key exchange protocol for wireless network environments
    Wu, Tsu-Yang
    Tseng, Yuh-Min
    Yu, Ching-Wen
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2011,
  • [10] Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique
    Tseng, Yuh-Min
    Wu, Tsu-Yang
    INFORMATICA, 2010, 21 (02) : 247 - 258