Contributory group key exchange in the presence of malicious participants

被引:16
|
作者
Bresson, E. [1 ]
Manulis, M. [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Louvain, Belgium
关键词
D O I
10.1049/iet-ifs:20070113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol's output: misbehaving participants might have personal advantage in influencing the value of the group key. In fact, the absence of trust relationship is the main feature of GKE (when compared with group key transport) protocols. The existing notions of security are enlarged by identifying limitations in some previously proposed security models while taking into account different types of corruptions (weak and strong). To illustrate these notions, two efficient and provably secure generic solutions, compilers, are presented.
引用
收藏
页码:85 / 93
页数:9
相关论文
共 50 条
  • [31] Revisiting pairing based group key exchange
    Desmedt, Yvo
    Lange, Tanja
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2008, 5143 : 53 - +
  • [32] A collusion attack on asymmetric group key exchange
    Teng, Jikai
    Wu, Chuankun
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2189 - 2193
  • [33] A secure and scalable group key exchange system
    Burmester, M
    Desmedt, Y
    INFORMATION PROCESSING LETTERS, 2005, 94 (03) : 137 - 143
  • [34] Efficient compilers for authenticated group key exchange
    Tang, Q
    Mitchell, CJ
    COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 192 - 197
  • [35] Scalable Protocols for Authenticated Group Key Exchange
    Jonathan Katz
    Moti Yung
    Journal of Cryptology, 2007, 20 : 85 - 113
  • [36] Provably secure model for group key exchange
    Cao, Chunjie
    Ma, Hanfeng
    Moon, Sanglae
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1380 - 1385
  • [37] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [38] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [39] Group key exchange protocols withstanding ephemeral-key reveals
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel Luis
    Suarez Corona, Adriana
    IET INFORMATION SECURITY, 2018, 12 (01) : 79 - 86
  • [40] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24