Sciweavers

Share
ATC
2007
Springer

Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust

10 years 3 months ago
Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust
Group key exchange protocols allow their participants to compute a secret key which can be used to ensure security and privacy for various multi-party applications. The resulting group key should be computed through cooperation of all protocol participants such that none of them is trusted to have any advantage concerning the protocol’s output. This trust relationship states the main difference between group key exchange and group key transport protocols. Obviously, misbehaving participants in group key exchange protocols may try to influence the resulting group key, thereby disrupting this trust relationship, and also causing further security threats. This paper analyzes the currently known security models for group key exchange protocols with respect to this kind of attacks by malicious participants and proposes an extended model to remove the identified limitations. Additionally, it proposes an efficient and provably secure generic solution, a compiler, to guarantee these addit...
Emmanuel Bresson, Mark Manulis
Added 07 Jun 2010
Updated 07 Jun 2010
Type Conference
Year 2007
Where ATC
Authors Emmanuel Bresson, Mark Manulis
Comments (0)
books