We propose a deniable group key establishment protocol in the standard model. In a deniable group key establishment protocol, the transcript of the protocol session can not be used to prove the involvement of the participant in the protocol session. In other words, the participant can deny that she has joined in the protocol session which she has actually joined in. We figure out that the deniable group key establishment protocol should has the group deniable authentication characteristic, which implies authentication in the protocol execution and deniability after the protocol execution. We give a new definition of the group key establishment deniability in this paper. It is an extension of the definition given by Jens-Matthias Bohli and Rainer Steinwandt. We construct our deniable group key establishment protocol by using a variant of Schnorr's zero-knowledge identification scheme and Burmester's group key establishment protocol. © Springer-Verlag Berlin Heidelberg 2010.
CITATION STYLE
Zhang, Y., Wang, K., & Li, B. (2010). Information Security, Practice and Experience. (J. Kwak, R. H. Deng, Y. Won, & G. Wang, Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6047, pp. 308–323). Berlin, Heidelberg: Springer Berlin Heidelberg. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-78650301009&partnerID=tZOtx3y1
Mendeley helps you to discover research relevant for your work.