Contributory group key exchange in the presence of malicious participants

被引:16
|
作者
Bresson, E. [1 ]
Manulis, M. [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Louvain, Belgium
关键词
D O I
10.1049/iet-ifs:20070113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol's output: misbehaving participants might have personal advantage in influencing the value of the group key. In fact, the absence of trust relationship is the main feature of GKE (when compared with group key transport) protocols. The existing notions of security are enlarged by identifying limitations in some previously proposed security models while taking into account different types of corruptions (weak and strong). To illustrate these notions, two efficient and provably secure generic solutions, compilers, are presented.
引用
收藏
页码:85 / 93
页数:9
相关论文
共 50 条
  • [22] The Design of Secure Group Communication with Contributory Group Key Agreement Based on Mobile Ad Hoc Network
    Chen, Yu-Yi
    Huang, Chuan-Chiang
    Jan, Jinn-Ke
    2016 INTERNATIONAL SYMPOSIUM ON COMPUTER, CONSUMER AND CONTROL (IS3C), 2016, : 455 - 460
  • [23] Dynamic Group Key Exchange Revisited
    Yang, Guomin
    Tan, Chik How
    CRYPTOLOGY AND NETWORK SECURITY, 2010, 6467 : 261 - 277
  • [24] An unbalanced protocol for group key exchange
    Herranz, J
    Villar, JL
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 172 - 180
  • [25] Offline Assisted Group Key Exchange
    Boyd, Colin
    Davies, Gareth T.
    Gjosteen, Kristian
    Jiang, Yao
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 268 - 285
  • [26] On the malicious participants problem in computational grid
    Chen, WG
    Zheng, WM
    Yang, GW
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 839 - 848
  • [27] Comments on "Provably Secure Constant Round Contributory Group Key Agreement in Dynamic Setting"
    Tan, Chik-How
    Yang, Guomin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2010, 56 (11) : 5887 - 5888
  • [28] Group Key Exchange Compilers from Generic Key Exchanges
    Hougaard, Hector B.
    Miyaji, Atsuko
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 162 - 184
  • [29] An Interval Based Contributory Key Agreement
    Rajaram, M.
    Thilagavathy, D.
    2010 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR COMPUTING, 2010, : 13 - +
  • [30] Universally composable group key exchange protocol
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    不详
    Dianzi Yu Xinxi Xuebao, 2009, 7 (1571-1575):