Contributory group key exchange in the presence of malicious participants

被引:16
|
作者
Bresson, E. [1 ]
Manulis, M. [1 ]
机构
[1] Catholic Univ Louvain, UCL Crypto Grp, Louvain, Belgium
关键词
D O I
10.1049/iet-ifs:20070113
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol's output: misbehaving participants might have personal advantage in influencing the value of the group key. In fact, the absence of trust relationship is the main feature of GKE (when compared with group key transport) protocols. The existing notions of security are enlarged by identifying limitations in some previously proposed security models while taking into account different types of corruptions (weak and strong). To illustrate these notions, two efficient and provably secure generic solutions, compilers, are presented.
引用
收藏
页码:85 / 93
页数:9
相关论文
共 50 条
  • [41] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 105 - 123
  • [42] LEARNING IN THE PRESENCE OF MALICIOUS ERRORS
    KEARNS, M
    LI, M
    SIAM JOURNAL ON COMPUTING, 1993, 22 (04) : 807 - 837
  • [43] Security Analysis of Broadcaster Group Key Exchange Protocols
    LI Li~ 1
    2. School of Computer
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1577 - 1580
  • [44] On the Minimum Communication Effort for Secure Group Key Exchange
    Armknecht, Frederik
    Furukawa, Jun
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 320 - 337
  • [45] AN ACTIVE ATTACK ON A DISTRIBUTED GROUP KEY EXCHANGE SYSTEM
    Baouch, Mohamed
    Antonio Lopez-Ramos, Juan
    Torrecillas, Blas
    Schnyder, Reto
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2017, 11 (04) : 715 - 717
  • [46] Group-oriented authentication mechanism with key exchange
    Chang, YS
    Wu, TC
    COMPUTER COMMUNICATIONS, 1998, 21 (05) : 485 - 497
  • [47] Hybrid Group Key Exchange with Application to Constrained Networks
    Boyd, Colin
    Fondevik, Elsie Mestl
    Gjosteen, Kristian
    Millerjord, Lise
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 455 - 472
  • [48] Provable Efficient Certificateless Group Key Exchange Protocol
    MOON Sangjae
    Wuhan University Journal of Natural Sciences, 2007, (01) : 41 - 45
  • [49] Security of Group Key Exchange Protocols with Different Passwords
    Phan, Raphael C. -W.
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 147 - 152
  • [50] Scalable group key exchange protocol with provable security
    Li, Chengbang
    Xu, Chunxiang
    COMPEL-THE INTERNATIONAL JOURNAL FOR COMPUTATION AND MATHEMATICS IN ELECTRICAL AND ELECTRONIC ENGINEERING, 2013, 32 (02) : 612 - 619