Skip to main content
Log in

Security analysis of broadcaster group key exchange protocols

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Group key exchange protocols are basic protocols to provide privacy and integrity in secure group communication. This paper discusses the security of one type of group key exchange protocols and defines the kind of protocols as broadcaster group protocols. It points out two attacks on this kind of protocols. The first attack can be avoided by using fresh values in each action during one session of the group protocol. The second attack should be related with concrete application. It also proposes a dynamic key agreement protocol as an example of solutions at the last part of the paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ateniese G, Steiner M, Tsudik G. Authenticated Group Key Agreement and Friends [C]//Proceedings of the 5 th ACM Conference on Computer and Communications Security, SanFrancisco, USA: ACM Press, 1998:17–26.

    Google Scholar 

  2. Ateniese G, Steiner M, Tsudik G. New Multi-Party Authentication Services and Key Agreement Protocols[J].IEEE Journal on Selected Areas in Communication, 2000,18(4). 628–639.

    Article  Google Scholar 

  3. Kim Y, Perrig A, Tsudik G. Tree-Based Group Key Agreement[J].ACM Trasactions on Information and System Securith, 2004,7(1):60–96.

    Article  Google Scholar 

  4. Pereira O.Modelling and Security Analysis of Authenticated Group Key Agreement Protocols[D]. Belgique: University of Catholique de louvain, 2003.

    Google Scholar 

  5. Li Li.Research of Formal Analysis and Verification Technology of Security Protocols[D]. Wuhan: School of Computer, Wuhan University, 2004.

    Google Scholar 

  6. Caronni G, Waldvogel M, Sun D,et al. Efficient Security for Large and Dynamic Groups[C]//Proceedings of 7th Workshop on Enabling Technologies, California: IEEE Press, 1998:376–383.

    Google Scholar 

  7. Setiner M, Taudik G, Waidnet M.Cliques: A New Approach to Group Key Agreement[R]. Zurich: IBM Research Lab, 1997.

    Google Scholar 

  8. Balenson D, McGrew D, Sherman A. Key Management for Large Dynamic Groups: One-Way Function Trees and Amortized Initialization [R/OL]. [2006-03-10].http://ietfrepoot. isoc. org/all-IPS/draft-balenson-groupkey mgont-oftoo.txt.

  9. Lee P P C, Lui J C S, Yau D K Y. Distributed Collaborative Key Agreement Protocols for Dynamic Peer Groups[C] //Proceedings of 10 th IEEE International Conference on Network Protocols. Paris, France: IEEE Computer Society Press, 2002: 322–331.

    Google Scholar 

  10. Banerjee S, Bhattacharjee B. Scalable Secure Group Communication over IP Multicast[J].JSAC Special Issue on Network Support for Group Communication, 2002,20(8):156–163.

    Google Scholar 

  11. Bresson E, Chevassut O, Pointcheval D. Provably Authenticated Group Diffe-Hellman Key Exchange-the Dynamic Case [C]//Proceedings of AsiaCrypt 2001(2248), GoldCoast, Australia: Springer-Verlag, 2001: 290–309.

    Google Scholar 

  12. Thayer F J, Herzog J C, Guttman J. Strand Spaces: Why is a Security Protocol Correct? [C]//Proceedings of the 1998IEEE Symposium on Security and Privacy. Los Alamitos: IEEE Computer Society Press, 1998: 160–171.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Li Li.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90104005, 60473023) and the National High Technology Research and Development Program of China (863 Program) (2002AA41051)

Biography: LI Li(1976-), female, Lecturer, Ph. D., research direction: information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Li, L., Huanguo, Z. Security analysis of broadcaster group key exchange protocols. Wuhan Univ. J. Nat. Sci. 11, 1577–1580 (2006). https://doi.org/10.1007/BF02831824

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831824

Key words

CLC number

Navigation