Modeling key compromise impersonation attacks on group key exchange protocols

48Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles. © International Association for Cryptologic Research 2009.

Cite

CITATION STYLE

APA

Gorantla, M. C., Boyd, C., & Nieto, J. M. G. (2009). Modeling key compromise impersonation attacks on group key exchange protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5443, pp. 105–123). Springer Verlag. https://doi.org/10.1007/978-3-642-00468-1_7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free