Universally Composable Symbolic Analysis of Group Key Exchange Protocol

被引:0
|
作者
Zhang Zijian [1 ]
Zhu Liehuang [1 ]
Liao Lejian [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
基金
中国国家自然科学基金;
关键词
universally composable symbolic analysis; universally composable; mapping algorithm; burmester-desmedt protocol; group key exchange protocol;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Canetti and Herzog have already proposed universally composable symbolic analysis (UCSA) to analyze mutual authentication and key exchange protocols. However, they do not analyze group key exchange protocol. Therefore, this paper explores an approach to analyze group key exchange protocols, which realize;automation and guarantee the soundness of cryptography. Considered that there exist many kinds of group key exchange protocols and the participants' number of each protocol is arbitrary. So this paper takes the case of Burmester-Desmedt (BD) protocol with three participants against passive adversary (3-BD-Passive). In a nutshell, our works lay the root for analyzing group key exchange protocols automatically without sacrificing soundness of cryptography.
引用
收藏
页码:59 / 65
页数:7
相关论文
共 50 条
  • [31] Universally composable key-evolving signature
    Zhou, Jin
    Zhu, YueFei
    Chang, TingMao
    Zhang, YaJuan
    6TH INTERNATIONAL CONFERENCE ON COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT APPLICATIONS, PROCEEDINGS, 2007, : 97 - +
  • [32] Universally composable three-party password-authenticated key exchange with contributiveness
    Hu, Xuexian
    Zhang, Zhenfeng
    Zhang, Qihui
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (06) : 1100 - 1111
  • [33] Universally Composable Symbolic Analysis for Two-Party Protocols Based on Homomorphic Encryption
    Dahl, Morten
    Damgard, Ivan
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 695 - 712
  • [34] Universally Composable NIZK Protocol in an Internet Voting Scheme
    Based, Md Abdul
    Mjolsnes, Stig Frode
    SECURITY AND TRUST MANAGEMENT, 2011, 6710 : 147 - 162
  • [35] Key Exchange in the Post-snowden Era: Universally Composable Subversion-Resilient PAKE
    Chakraborty, Suvradip
    Magliocco, Lorenzo
    Magri, Bernardo
    Venturi, Daniele
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2024, PT V, 2025, 15488 : 101 - 133
  • [36] Universally composable oblivious transfer protocol based on VSPH
    Li, Feng-Hua
    Feng, Tao
    Ma, Jian-Feng
    Tongxin Xuebao/Journal on Communications, 2007, 28 (07): : 28 - 34
  • [37] Universally Composable Security Analysis of TLS
    Gajek, Sebastian
    Manulis, Mark
    Pereira, Olivier
    Sadeghi, Ahmad-Reza
    Schwenk, Joerg
    PROVABLE SECURITY, 2008, 5324 : 313 - +
  • [38] Universally composable Secure RFID communication protocol in supply chains
    Key Laboratory of Computer Networks and Information Security, Xidian University, Xi'an 710071, China
    不详
    不详
    不详
    Jisuanji Xuebao, 2008, 10 (1754-1767):
  • [39] Universally composable secure authentication protocol for wireless Mesh networks
    Yang, Chao
    Cao, Chun-Jie
    Ma, Jian-Feng
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2007, 34 (05): : 814 - 817
  • [40] An unbalanced protocol for group key exchange
    Herranz, J
    Villar, JL
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 172 - 180