ON THE (IN)SECURITY OF GROUP KEY TRANSFER PROTOCOLS BASED ON SECRET SHARING

被引:0
|
作者
Olimid, Ruxandra F. [1 ]
机构
[1] Univ Bucharest, Dept Comp Sci, Bucharest, Romania
关键词
Group key transfer; Group key establishment; Secret sharing; Formal security model; Replay attack; Insider attack; Known key attack; EXCHANGE; AGREEMENT;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted Key Generation Center (KGC) selects a uniformly random value that has never been used before and securely distributes it to the legitimate principals. The paper restricts to GKT based on secret sharing; it briefly reviews the security goals and the existing formal security models. We motivate our work by the lack of GKT protocols based on secret sharing that are proved secure in a formal security model. Most of the recent proposals only provide informal and incomplete arguments to claim security, which makes them susceptible to known vulnerabilities. We support our affirmation by exemplifying with three different types of attacks (replay attack, insider attack and known key attack) mounted against protocols published within the last three years. We emphasize that none of these attacks would have been possible against a GKT protocol proved secure in a usual formal security model.
引用
收藏
页码:378 / 387
页数:10
相关论文
共 50 条
  • [1] Security and Improvement of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Yuan, Wei
    Hu, Liang
    Li, Hongtu
    Chu, Jianfeng
    [J]. APPLIED MATHEMATICS & INFORMATION SCIENCES, 2013, 7 (05): : 1943 - 1949
  • [2] On the Vulnerability of a Group Key Transfer Protocol based on Secret Sharing
    Olimid, Ruxandra F.
    [J]. 2014 IEEE 9TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS (SACI), 2014, : 159 - 163
  • [3] An Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Sun, Yi
    Wen, Qiaoyan
    Sun, Hongxiang
    Li, Wenmin
    Jin, Zhengping
    Zhang, Hua
    [J]. 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 403 - 408
  • [4] Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Harn, Lein
    Lin, Changlu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (06) : 842 - 846
  • [5] Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing
    Nam, Junghyun
    Kim, Moonseong
    Paik, Juryon
    Jeon, Woongryul
    Lee, Byunghee
    Won, Dongho
    [J]. FUTURE GENERATION INFORMATION TECHNOLOGY, 2011, 7105 : 309 - +
  • [6] Secure Key Transfer Protocol Based on Secret Sharing for Group Communications
    Lee, Chia-Yin
    Wang, Zhi-Hui
    Harn, Lein
    Chang, Chin-Chen
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2069 - 2076
  • [7] An Improved Authenticated Group Key Transfer Protocol Based on Secret Sharing
    Liu, Yining
    Cheng, Chi
    Cao, Jianyu
    Jiang, Tao
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2013, 62 (11) : 2335 - 2336
  • [8] On the group key transfer protocol using secret sharing
    Wang, Dong
    Huang, Juan
    Li, Yajun
    Song, Guoxiang
    [J]. Journal of Computational Information Systems, 2015, 11 (01): : 247 - 252
  • [9] Cryptanalysis of olimid's group key transfer protocol based on secret sharing
    Jaiswal, Priyanka
    Tripathi, Sachin
    [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (05): : 1129 - 1137
  • [10] Novel secret sharing scheme based on key transfer protocols in a wireless sensor network environment
    Khan, Muhammad Sulaiman
    Ali, Farhan
    Wei, Wang
    Xia, Na
    Khan, Nadeem
    [J]. INTERNATIONAL JOURNAL OF ADVANCED AND APPLIED SCIENCES, 2020, 7 (06): : 22 - 32