Consistency of group key exchange protocols

The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attack...

Full description

Saved in:
Bibliographic Details
Main Authors: CAO Chun-jie1, MA Jian-feng1, GUO Yuan-bo2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2008-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74656517/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537574028443648
author CAO Chun-jie1
MA Jian-feng1
GUO Yuan-bo2
author_facet CAO Chun-jie1
MA Jian-feng1
GUO Yuan-bo2
author_sort CAO Chun-jie1
collection DOAJ
description The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed.
format Article
id doaj-art-d2768b4c210047d282457f12608fe387
institution Kabale University
issn 1000-436X
language zho
publishDate 2008-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-d2768b4c210047d282457f12608fe3872025-01-14T08:33:14ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01717674656517Consistency of group key exchange protocolsCAO Chun-jie1MA Jian-feng1GUO Yuan-bo2The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed.http://www.joconline.com.cn/zh/article/74656517/consistencygroup key exchangeattack
spellingShingle CAO Chun-jie1
MA Jian-feng1
GUO Yuan-bo2
Consistency of group key exchange protocols
Tongxin xuebao
consistency
group key exchange
attack
title Consistency of group key exchange protocols
title_full Consistency of group key exchange protocols
title_fullStr Consistency of group key exchange protocols
title_full_unstemmed Consistency of group key exchange protocols
title_short Consistency of group key exchange protocols
title_sort consistency of group key exchange protocols
topic consistency
group key exchange
attack
url http://www.joconline.com.cn/zh/article/74656517/
work_keys_str_mv AT caochunjie1 consistencyofgroupkeyexchangeprotocols
AT majianfeng1 consistencyofgroupkeyexchangeprotocols
AT guoyuanbo2 consistencyofgroupkeyexchangeprotocols