Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing

  • Mijin KimEmail author
  • Namje Park
  • Dongho Won
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 274)


Group key exchange protocols are cryptographic algorithms that describe how a group of parties can communicate with their common secret key over insecure public networks. In 2013, Olimid proposed an improved group key transfer protocol based on secret sharing, and claimed that he eliminated the flaws in Sun et al.’s group key transfer protocol. However, our analysis shows that the protocol is still vulnerable to outsider and insider attacks and does not provide known key security. In this paper, we show a detailed analysis of flaws in the protocol.


key exchange protocol group key transfer secret sharing attack confidentiality 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Shamir, A.: How to share secret. Communications of the ACM 22(11), 612–613 (1979)MathSciNetzbMATHCrossRefGoogle Scholar
  2. 2.
    Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  3. 3.
    Nam, J., Paik, J., Kim, U.M., Won, D.: Resource-aware protocol for authenticated group key exchange in integrated wired and wireless networks. Journal of Information Sciences 177, 5441–5467 (2007)MathSciNetzbMATHCrossRefGoogle Scholar
  4. 4.
    Hajyvahabzadeh, M., Eidkhani, E., Mortazavi, S.A., Pour, A.N.: A new group key management protocol using code for key calculation: CKC. Information Science and Applications, 1–6 (2010)Google Scholar
  5. 5.
    Harn, L., Lin, C.: Authenticated group key transferprotocol based on secret sharing. IEEE Transactions on Computers 59(6), 842–846 (2010)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Nam, J., Paik, J., Won, D.: A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol. Journal of Information Sciences 181(1), 234–238 (2011)MathSciNetzbMATHCrossRefGoogle Scholar
  7. 7.
    Nam, J., Kim, M., Paik, J., Won, D.: Security Weaknesses in Harn-Lin and Dutta-Barua protocols for group key establishment. KSII Transactions on Internet and Information Systems 6(2), 751–765 (2012)Google Scholar
  8. 8.
    Sun, Y., Wen, Q., Sun, H., Li, W., Jin, Z., Zhang, H.: An authenticated group key transferprotocol based on secret sharing. Procedia Engineering 9, 403–408 (2012)CrossRefGoogle Scholar
  9. 9.
    Olimid, R.F.: On the security of an authenticated group key transfer protocol based on secret sharing. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 399–408. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.College of Information and Communication EngineeringSungkyunkwan UniversitySuwonKorea
  2. 2.Department of Computer Education Teachers CollegeJeju National UniversityJejuKorea

Personalised recommendations