Consistency of group key exchange protocols
The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attack...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2008-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74656517/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841537574028443648 |
---|---|
author | CAO Chun-jie1 MA Jian-feng1 GUO Yuan-bo2 |
author_facet | CAO Chun-jie1 MA Jian-feng1 GUO Yuan-bo2 |
author_sort | CAO Chun-jie1 |
collection | DOAJ |
description | The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed. |
format | Article |
id | doaj-art-d2768b4c210047d282457f12608fe387 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2008-01-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-d2768b4c210047d282457f12608fe3872025-01-14T08:33:14ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2008-01-01717674656517Consistency of group key exchange protocolsCAO Chun-jie1MA Jian-feng1GUO Yuan-bo2The consistency is a basic security requirement,but it is much trickier and many times overlooked. By care-fully analyzed to several famous were found provably-secure group key exchange protocols at present,different attacks of the consistency to these protocols were found respectively. These attacks will result in that all the members have different view of peers’ identities and destroying the integrity of the current group. Furthermore,improvements to overcome the security vulnerabilities of these protocols were proposed.http://www.joconline.com.cn/zh/article/74656517/consistencygroup key exchangeattack |
spellingShingle | CAO Chun-jie1 MA Jian-feng1 GUO Yuan-bo2 Consistency of group key exchange protocols Tongxin xuebao consistency group key exchange attack |
title | Consistency of group key exchange protocols |
title_full | Consistency of group key exchange protocols |
title_fullStr | Consistency of group key exchange protocols |
title_full_unstemmed | Consistency of group key exchange protocols |
title_short | Consistency of group key exchange protocols |
title_sort | consistency of group key exchange protocols |
topic | consistency group key exchange attack |
url | http://www.joconline.com.cn/zh/article/74656517/ |
work_keys_str_mv | AT caochunjie1 consistencyofgroupkeyexchangeprotocols AT majianfeng1 consistencyofgroupkeyexchangeprotocols AT guoyuanbo2 consistencyofgroupkeyexchangeprotocols |