Information Security, Practice and Experience

  • Zhang Y
  • Wang K
  • Li B
ISSN: 03029743
N/ACitations
Citations of this article
3Readers
Mendeley users who have this article in their library.

Abstract

We propose a deniable group key establishment protocol in the standard model. In a deniable group key establishment protocol, the transcript of the protocol session can not be used to prove the involvement of the participant in the protocol session. In other words, the participant can deny that she has joined in the protocol session which she has actually joined in. We figure out that the deniable group key establishment protocol should has the group deniable authentication characteristic, which implies authentication in the protocol execution and deniability after the protocol execution. We give a new definition of the group key establishment deniability in this paper. It is an extension of the definition given by Jens-Matthias Bohli and Rainer Steinwandt. We construct our deniable group key establishment protocol by using a variant of Schnorr's zero-knowledge identification scheme and Burmester's group key establishment protocol. © Springer-Verlag Berlin Heidelberg 2010.

Cite

CITATION STYLE

APA

Zhang, Y., Wang, K., & Li, B. (2010). Information Security, Practice and Experience. (J. Kwak, R. H. Deng, Y. Won, & G. Wang, Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6047, pp. 308–323). Berlin, Heidelberg: Springer Berlin Heidelberg. Retrieved from http://www.scopus.com/inward/record.url?eid=2-s2.0-78650301009&partnerID=tZOtx3y1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free