• DocumentCode
    851528
  • Title

    Contributory group key exchange in the presence of malicious participants

  • Author

    Bresson, E. ; Manulis, M.

  • Author_Institution
    DCSSI Crypto Lab. Paris, Paris
  • Volume
    2
  • Issue
    3
  • fYear
    2008
  • fDate
    9/1/2008 12:00:00 AM
  • Firstpage
    85
  • Lastpage
    93
  • Abstract
    In a group key exchange (GKE) protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol´s output: misbehaving participants might have personal advantage in influencing the value of the group key. In fact, the absence of trust relationship is the main feature of GKE (when compared with group key transport) protocols. The existing notions of security are enlarged by identifying limitations in some previously proposed security models while taking into account different types of corruptions (weak and strong). To illustrate these notions, two efficient and provably secure generic solutions, compilers, are presented.
  • Keywords
    cryptographic protocols; transport protocols; contributory group key exchange; group key transport protocols; malicious participants; misbehaving participants;
  • fLanguage
    English
  • Journal_Title
    Information Security, IET
  • Publisher
    iet
  • ISSN
    1751-8709
  • Type

    jour

  • DOI
    10.1049/iet-ifs:20070113
  • Filename
    4610940