• DocumentCode
    162308
  • Title

    On the vulnerability of a Group Key Transfer protocol based on secret sharing

  • Author

    Olimid, Ruxandra F.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Bucharest, Bucharest, Romania
  • fYear
    2014
  • fDate
    15-17 May 2014
  • Firstpage
    159
  • Lastpage
    163
  • Abstract
    Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted entity selects a private key and securely distributes it to the qualified participants. Hsu et al. introduced a GKT protocol based on secret sharing, which they claimed to be secure. Unlike their affirmation, we report a vulnerability: an insider can cancel key consistency such that at the end of the protocol distinct users own different keys. This leads to the futility of the protocol. Even more, the attacker is able to choose the values of the injected keys on his own wish. Finally, we propose a simple and efficient countermeasure that stands against the revealed attack.
  • Keywords
    cryptographic protocols; private key cryptography; GKT protocol; common secret key sharing; group key transfer protocol vulnerability; private key; trusted entity; Authentication; Computational intelligence; Cryptography; Generators; Protocols; Silicon;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Applied Computational Intelligence and Informatics (SACI), 2014 IEEE 9th International Symposium on
  • Conference_Location
    Timisoara
  • Type

    conf

  • DOI
    10.1109/SACI.2014.6840053
  • Filename
    6840053