Abstract
Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.
Similar content being viewed by others
References
Ateniese G, Steiner M, Tsudik G. Authenticated Group Key Agreement and Friends [C]//Proceedings of the 5 th ACM Conference on Computer and Communications Security, SanFrancisco, USA: ACM Press, 1998:17–26.
Ateniese G, Steiner M, Tsudik G. New Multi-Party Authentication Services and Key Agreement Protocols[J].IEEE Journal on Selected Areas in Communication, 2000,18(4). 628–639.
Kim Y, Perrig A, Tsudik G. Tree-Based Group Key Agreement[J].ACM Trasactions on Information and System Securith, 2004,7(1):60–96.
Pereira O.Modelling and Security Analysis of Authenticated Group Key Agreement Protocols[D]. Belgique: University of Catholique de louvain, 2003.
Li Li.Research of Formal Analysis and Verification Technology of Security Protocols[D]. Wuhan: School of Computer, Wuhan University, 2004.
Caronni G, Waldvogel M, Sun D,et al. Efficient Security for Large and Dynamic Groups[C]//Proceedings of 7th Workshop on Enabling Technologies, California: IEEE Press, 1998:376–383.
Setiner M, Taudik G, Waidnet M.Cliques: A New Approach to Group Key Agreement[R]. Zurich: IBM Research Lab, 1997.
Balenson D, McGrew D, Sherman A. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization [R/OL]. [2006-03-10].http://ietfrepoot. isoc. org/all-IPS/draft-balenson-groupkey mgont-oftoo.txt.
Lee P P C, Lui J C S, Yau D K Y. Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups[C] //Proceedings of 10 th IEEE International Conference on Network Protocols. Paris, France: IEEE Computer Society Press, 2002: 322–331.
Banerjee S, Bhattacharjee B. Scalable Secure Group Communication over IP Multicast[J].JSAC Special Issue on Network Support for Group Communication, 2002,20(8):156–163.
Bresson E, Chevassut O, Pointcheval D. Provably Authenticated Group Diffe-Hellman Key Exchange-the Dynamic Case [C]//Proceedings of AsiaCrypt 2001(2248), GoldCoast, Australia: Springer-Verlag, 2001: 290–309.
Thayer F J, Herzog J C, Guttman J. Strand Spaces: Why is a Security Protocol Correct? [C]//Proceedings of the 1998IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998: 160–171.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (90104005, 60473023) and the National High Technology Research and Development Program of China (863 Program) (2002AA41051)
Biography: LI Li(1976-), female, Lecturer, Ph. D., research direction: information security.
Rights and permissions
About this article
Cite this article
Li, L., Huanguo, Z. Security analysis of broadcaster group key exchange protocols. Wuhan Univ. J. Nat. Sci. 11, 1577–1580 (2006). https://doi.org/10.1007/BF02831824
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02831824