Contributory group key exchange in the presence of malicious participants

نویسندگان

  • Emmanuel Bresson
  • Mark Manulis
چکیده

In a group key exchange protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol’s output: misbehaving participants might have personal advantage in influencing the final value of the key. In fact, the absence of trust relationship is the main feature of group key exchange (when compared to group key transport) protocols. This paper enlarges existing notions of security by identifying limitations in some previously proposed security models. To illustrate these notions, two efficient and provably secure generic solutions – compilers – are presented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust

Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting group key should be computed through cooperation of all protocol participants such that none of them is trusted to have any advantage concerning the protocol’s output. This trust relationship states the main difference...

متن کامل

Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

An authenticated group key exchange (AGKE) protocol allows participants to construct a common key and provide secure group communications in cooperative and distributed applications. Recently, Choi et al. proposed an identity (ID)-based authenticated group key exchange (IDAGKE) protocol from bilinear pairings. However, their protocol suffered from an insider colluding attack because it didn’t r...

متن کامل

Attack on An ID-based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

An authenticated group key exchange (AGKE) protocol allows a group of participants to establish a common session key and then provides secure group communications in collaborative and distributed applications. Recently, Wu et al. proposed an ID-based authenticated group key exchange protocol based on bilinear pairings. They claimed that their protocol can detect and identify the malicious parti...

متن کامل

Analysis and Improvement on a Contributory Group Key Exchange Protocol Based on the Diffie-Hellman Technique

In 2008, based on the two-party Diffie–Hellman technique, Biswas proposed a contributory group key exchange protocol called the Group-DH protocol. This contributory property is an important one of group key agreement. Unfortunately, in this paper we show that the proposed Group-DH protocol is not a contributory group key exchange protocol. Therefore, we propose an improved group key exchange pr...

متن کامل

A Provably Secure Revocable ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

The existence of malicious participants is a major threat for authenticated group key exchange (AGKE) protocols. Typically, there are two detecting ways (passive and active) to resist malicious participants in AGKE protocols. In 2012, the revocable identity- (ID-) based public key system (R-IDPKS) was proposed to solve the revocation problem in the ID-based public key system (IDPKS). Afterwards...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IET Information Security

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2008