A Group-Key Agreement Protocol Secure against The Malleability Attacks

被引:0
|
作者
Arita, Seiko [1 ]
Sakuma, Akihiko [1 ]
机构
[1] Inst Informat Secur, Kanagawa Ku, Yokohama, Kanagawa, Japan
关键词
EXCHANGE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In group key agreement protocols, it is important to consider the effects of existence of malicious insiders. In this paper, we define a type of key-control attacks and the security against them for group key agreement protocols with malicious insiders. Then, we give a first ideal functionality of group key agreement that takes key-control attacks (as well as key-integrity attacks) into consideration, and construct a group key agreement protocol that securely realizes the ideal functionality. The construction is efficient enough for practical uses, being comprised of 2 rounds and n messages for n-party groups.
引用
收藏
页码:525 / 530
页数:6
相关论文
共 50 条
  • [31] A Block-Free TGDH key agreement protocol for secure group communications
    Zou, XK
    Ramamurthy, B
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING AND NETWORKS, 2004, : 288 - 293
  • [32] Provably secure group key agreement protocol based on ECDH with integrated signature
    Naresh, Vankamamidi S.
    Murthy, Nistala V. E. S.
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (10) : 1085 - 1102
  • [33] Tree and elliptic curve based efficient and secure group key agreement protocol
    Rawat, Arjun
    Deshmukh, Maroti
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [34] Efficient and provably secure password-based group key agreement protocol
    Zheng, Ming-Hui
    Zhou, Hui-Hua
    Li, Jun
    Cui, Guo-Hua
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (05) : 948 - 953
  • [35] A Lightweight Group-Key Management Protocol for Ad Hoc Networks
    Miao, Changsheng
    Cao, Fengling
    Chen, Dong
    Chang, Guiran
    2012 SIXTH INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING (ICGEC), 2012, : 288 - 291
  • [36] An efficient key agreement protocol for secure authentication
    Kim, YS
    Huh, EN
    Hwang, J
    Lee, BW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 746 - 754
  • [37] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    Islam, S. K. Hafizul
    Singh, Abhishek
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 879 - 898
  • [38] Provably secure one-round certificateless authenticated group key agreement protocol for secure communications
    SK Hafizul Islam
    Abhishek Singh
    Wireless Personal Communications, 2015, 85 : 879 - 898
  • [39] On the Cost of Post-compromise Security in Concurrent Continuous Group-Key Agreement
    Auerbach, Benedikt
    Noval, Miguel Cueto
    Pascual-Perez, Guillermo
    Pietrzak, Krzysztof
    THEORY OF CRYPTOGRAPHY, TCC 2023, PT III, 2023, 14371 : 271 - 300
  • [40] An efficient eCK secure certificateless authenticated key agreement scheme with security against public key replacement attacks
    Daniel, Renu Mary
    Rajsingh, Elijah Blessing
    Silas, Salaja
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 156 - 172