DocumentCode :
162308
Title :
On the vulnerability of a Group Key Transfer protocol based on secret sharing
Author :
Olimid, Ruxandra F.
Author_Institution :
Dept. of Comput. Sci., Univ. of Bucharest, Bucharest, Romania
fYear :
2014
fDate :
15-17 May 2014
Firstpage :
159
Lastpage :
163
Abstract :
Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted entity selects a private key and securely distributes it to the qualified participants. Hsu et al. introduced a GKT protocol based on secret sharing, which they claimed to be secure. Unlike their affirmation, we report a vulnerability: an insider can cancel key consistency such that at the end of the protocol distinct users own different keys. This leads to the futility of the protocol. Even more, the attacker is able to choose the values of the injected keys on his own wish. Finally, we propose a simple and efficient countermeasure that stands against the revealed attack.
Keywords :
cryptographic protocols; private key cryptography; GKT protocol; common secret key sharing; group key transfer protocol vulnerability; private key; trusted entity; Authentication; Computational intelligence; Cryptography; Generators; Protocols; Silicon;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applied Computational Intelligence and Informatics (SACI), 2014 IEEE 9th International Symposium on
Conference_Location :
Timisoara
Type :
conf
DOI :
10.1109/SACI.2014.6840053
Filename :
6840053
Link To Document :
بازگشت