Consistency of group key exchange protocols
The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attack...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Editorial Department of Journal on Communications
2008-01-01
|
| Series: | Tongxin xuebao |
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails?columnId=74656517&Fpath=home&index=0 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850213789421535232 |
|---|---|
| author | CAO Chun-jie1 MA Jian-feng1 GUO Yuan-bo2 |
| author_facet | CAO Chun-jie1 MA Jian-feng1 GUO Yuan-bo2 |
| author_sort | CAO Chun-jie1 |
| collection | DOAJ |
| description | The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed. |
| format | Article |
| id | doaj-art-5bba2a1ee4634cbe96fc5ea0fddd3494 |
| institution | OA Journals |
| issn | 1000-436X |
| language | zho |
| publishDate | 2008-01-01 |
| publisher | Editorial Department of Journal on Communications |
| record_format | Article |
| series | Tongxin xuebao |
| spelling | doaj-art-5bba2a1ee4634cbe96fc5ea0fddd34942025-08-20T02:09:04ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01717674656517Consistency of group key exchange protocolsCAO Chun-jie1MA Jian-feng1GUO Yuan-bo2The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed.http://www.joconline.com.cn/thesisDetails?columnId=74656517&Fpath=home&index=0consistency;group key exchange;attack |
| spellingShingle | CAO Chun-jie1 MA Jian-feng1 GUO Yuan-bo2 Consistency of group key exchange protocols Tongxin xuebao consistency;group key exchange;attack |
| title | Consistency of group key exchange protocols |
| title_full | Consistency of group key exchange protocols |
| title_fullStr | Consistency of group key exchange protocols |
| title_full_unstemmed | Consistency of group key exchange protocols |
| title_short | Consistency of group key exchange protocols |
| title_sort | consistency of group key exchange protocols |
| topic | consistency;group key exchange;attack |
| url | http://www.joconline.com.cn/thesisDetails?columnId=74656517&Fpath=home&index=0 |
| work_keys_str_mv | AT caochunjie1 consistencyofgroupkeyexchangeprotocols AT majianfeng1 consistencyofgroupkeyexchangeprotocols AT guoyuanbo2 consistencyofgroupkeyexchangeprotocols |