Exploring Robustness in Group Key Agreement

نویسندگان

  • Yair Amir
  • Cristina Nita-Rotaru
  • John L. Schultz
  • Jonathan Robert Stanton
  • Yongdae Kim
  • Gene Tsudik
چکیده

Secure group communication is crucial for building distributed applications that work in dynamic environments and communicate over unsecured networks (e.g. the Internet). Key agreement is a critical part of providing security services for group communication systems. Most of the current contributory key agreement protocols are not designed to tolerate failures and membership changes during execution. In particular, nested or cascaded group membership events (such as partitions) are not accommodated. In this paper we present the first robust contributory key agreement protocols resilient to any sequence of events while preserving the group communication membership and ordering guarantees. Submission and Contact Information Primary/Secondary Areas: Security/Fault-Tolerance Contact author: Yair Amir Phone: 410-516-4803 Fax: 410-516-6134 Email: [email protected] This work was supported in part by a grant from the National Security Agency under the LUCITE program and by grant F30602-00-2-0526 from The Defense Advanced Research Projects Agency. Department of Computer Science, Johns Hopkins University, Baltimore, MD 21218, USA. Email: fyairamir, crisn, jschultz, [email protected] Computer Networks Division, USC Information Sciences Institute, Marina Del Ray, CA 90292-6695, USA. Email: [email protected] Information and Computer Science Department, University of California, Irvine Irvine, CA 92697-3425, USA. Email: [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks

Group key agreement (GKA) allows a set of players to establish a shared secret and thus bootstrap secure group communication. GKA is very useful in many types of peer group scenarios and applications. Since all GKA protocols involve multiple rounds, robustness to player failures is important and desirable. A robust group key agreement (RGKA) protocol runs to completion even if some players fail...

متن کامل

SEAL: A secure communication library for building dynamic group key agreement applications

We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms that allow a communication group to periodically renew a common secret group key for secure and private communication. The group key agreement protocols satisfy several important characteristics: distributed property (...

متن کامل

SEAL : A secure communication library for building dynamic group key agreement applications q

We present the SEcure communicAtion Library (SEAL) [source can be downloaded from: http://www.cse.cuhk.edu.hk/~cslui/ ANSRlab/software/SEAL/], a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms that allow a communication group to periodically renew a common secret group key for secure and private communication. The grou...

متن کامل

Efficient Authenticated Key Agreement Protocol for Dynamic Groups

Group key management presents a fundamental challenge in secure dynamic group communications. In this paper, we propose an efficient group authenticated key agreement protocol (EGAKA), which is designed to be fully distributed and fault-tolerant, provides efficient dynamic group membership management, mutual authentication among group members and is secure against both passive and active attack...

متن کامل

Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks

The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticated communication for these networks. Traditional key management solutions reported in the literature lack both the flexibility and robustness required to cope with the dynamic nature of ad hoc networks. In this paper, we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001