DocumentCode
162308
Title
On the vulnerability of a Group Key Transfer protocol based on secret sharing
Author
Olimid, Ruxandra F.
Author_Institution
Dept. of Comput. Sci., Univ. of Bucharest, Bucharest, Romania
fYear
2014
fDate
15-17 May 2014
Firstpage
159
Lastpage
163
Abstract
Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted entity selects a private key and securely distributes it to the qualified participants. Hsu et al. introduced a GKT protocol based on secret sharing, which they claimed to be secure. Unlike their affirmation, we report a vulnerability: an insider can cancel key consistency such that at the end of the protocol distinct users own different keys. This leads to the futility of the protocol. Even more, the attacker is able to choose the values of the injected keys on his own wish. Finally, we propose a simple and efficient countermeasure that stands against the revealed attack.
Keywords
cryptographic protocols; private key cryptography; GKT protocol; common secret key sharing; group key transfer protocol vulnerability; private key; trusted entity; Authentication; Computational intelligence; Cryptography; Generators; Protocols; Silicon;
fLanguage
English
Publisher
ieee
Conference_Titel
Applied Computational Intelligence and Informatics (SACI), 2014 IEEE 9th International Symposium on
Conference_Location
Timisoara
Type
conf
DOI
10.1109/SACI.2014.6840053
Filename
6840053
Link To Document