• DocumentCode
    2883644
  • Title

    An Insider-Resistant Group Key Exchange Protocol without Signatures

  • Author

    Huang, Hai ; Cao, Zhenfu

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
  • fYear
    2009
  • fDate
    14-18 June 2009
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    The well-known method for a group key exchange (GKE) protocol to be against insider attack is to make use of signatures. However, using signatures considerably degrades the performance of the GKE protocol. In this paper, we propose a new method to resist insider attack. The underlying tool of our method is a two-party authenticated key exchange (AKE) protocol, which can be used to authenticate all other participants´ session identifiers instead of using signatures. Based on the two- party AKE protocol, we propose an efficient insider-resistant GKE protocol without signatures. We show that our proposal is provably secure against insider attack if the underlying two-party AKE protocol is secure.
  • Keywords
    cryptographic protocols; telecommunication security; insider attack; insider resistant group key exchange protocol; two party authenticated key exchange protocol; Access control; Communications Society; Computer science; Degradation; Information security; Layout; Message authentication; Proposals; Protocols; Resists;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications, 2009. ICC '09. IEEE International Conference on
  • Conference_Location
    Dresden
  • ISSN
    1938-1883
  • Print_ISBN
    978-1-4244-3435-0
  • Electronic_ISBN
    1938-1883
  • Type

    conf

  • DOI
    10.1109/ICC.2009.5198734
  • Filename
    5198734