Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing
نویسندگان
چکیده
• The insider and outsider attacks against the improved version (Subsection 3.1, Methods 1 and 2; Subsection 3.2 Method 1) are limited by the success of a guessing attack against the hash function. We highlight that the attacks assume the guessing of a random number (not a password, which would have been feasible!). Hence, if the hash function is properly selected, the attacks are infeasible1. • The attacks mounted in Section 3.2, Method 2 and Section 3.3 are incorrect: the value α is chosen uniformly random for each session (see step 4 of the improved version) and therefore α(k1) 6= α(k2).
منابع مشابه
Computationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملA N Efficient Key Exchange Protocol Based on Secret Sharing
Group key protocols are still an important research issue in the network security, generation and sharing the secret session key is the important factor during the the groupkey transfer protocols. Usually it will be taken care of KGC. KGC encrypts session keys under another secret key shared with each entity during registration. In this paper, we propose an authenticated key transfer protocol b...
متن کاملOn the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing
Group key transfer protocols allow multiple parties to share a common secret key. They rely on a mutually trusted key generation center (KGC) that selects the key and securely distributes it to the authorized participants. Recently, Sun et al. proposed an authenticated group key transfer protocol based on secret sharing that they claim to be secure. We show that this is false: the protocol is s...
متن کاملSecure Key Transfer Protocol Based on Secret Sharing for Group Communications
Group key establishment is an important mechanism to construct a common session key for group communications. Conventional group key establishment protocols use an on-line trusted key generation center (KGC) to transfer the group key for each participant in each session. However, this approach requires that a trusted server be set up, and it incurs communication overhead costs. In this article,...
متن کاملA novel Group Key Transfer Protocol
Group key transfer protocols depend on a mutually trusted key generation center (KGC) to transport the group key to all group members secretly. This approach requires that a trusted sever be set up, and it incurs communication overhead costs. In addition, the existing group key transfer protocols based on secret sharing all use threshold schemes that need to compute a -degree interpolating poly...
متن کاملOn the (in)security of Group Key Transfer Protocols Based on Secret Sharing
Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted Key Generation Center (KGC) selects a uniformly random value that has never been used before and securely distributes it to the legitimate principals. The paper restricts to GKT based on secret sharing; it briefly reviews the security goals and the existing formal security models. We motivate our w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013