AN ACTIVE ATTACK ON A DISTRIBUTED GROUP KEY EXCHANGE SYSTEM

被引:1
|
作者
Baouch, Mohamed [1 ]
Antonio Lopez-Ramos, Juan [1 ]
Torrecillas, Blas [1 ]
Schnyder, Reto [2 ]
机构
[1] Univ Almeria, Dept Math, Ctra Sacramento S-N, Almeria 04120, Spain
[2] Univ Zurich, Inst Math, Winterthurerstr 190, CH-8057 Zurich, Switzerland
基金
瑞士国家科学基金会;
关键词
Multiparty key exchange; active attack; AGREEMENT;
D O I
10.3934/amc.2017052
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.
引用
收藏
页码:715 / 717
页数:3
相关论文
共 50 条
  • [31] Scalable Protocols for Authenticated Group Key Exchange
    Jonathan Katz
    Moti Yung
    Journal of Cryptology, 2007, 20 : 85 - 113
  • [32] Provably secure model for group key exchange
    Cao, Chunjie
    Ma, Hanfeng
    Moon, Sanglae
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2006, 13E : 1380 - 1385
  • [33] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [34] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [35] Computation and communication efficient secure group key exchange protocol for low configuration system
    Rawat A.S.
    Deshmukh M.
    International Journal of Information Technology, 2021, 13 (3) : 839 - 843
  • [36] Nonclassical Attack on a Quantum Key Distribution System
    Pljonkin, Anton
    Petrov, Dmitry
    Sabantina, Lilia
    Dakhkilgova, Kamila
    ENTROPY, 2021, 23 (05)
  • [37] Insider attack on a password-based group key agreement
    Li, Hongtu
    Hu, Liang
    Yuan, Wei
    Li, Hongwei
    Chu, Jianfeng
    CEIS 2011, 2011, 15
  • [38] Authenticated group communication to mitigate collusion attack in key sharing
    Annlin Jeba, S.V., 1600, Asian Network for Scientific Information (12):
  • [39] Group key exchange protocols withstanding ephemeral-key reveals
    Gonzalez Vasco, Maria Isabel
    Perez del Pozo, Angel Luis
    Suarez Corona, Adriana
    IET INFORMATION SECURITY, 2018, 12 (01) : 79 - 86
  • [40] Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
    Gorantla, M. Choudary
    Boyd, Colin
    Gonzalez Nieto, Juan Manuel
    Manulis, Mark
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2011, 14 (04) : 1 - 24