DocumentCode
2883644
Title
An Insider-Resistant Group Key Exchange Protocol without Signatures
Author
Huang, Hai ; Cao, Zhenfu
Author_Institution
Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai, China
fYear
2009
fDate
14-18 June 2009
Firstpage
1
Lastpage
5
Abstract
The well-known method for a group key exchange (GKE) protocol to be against insider attack is to make use of signatures. However, using signatures considerably degrades the performance of the GKE protocol. In this paper, we propose a new method to resist insider attack. The underlying tool of our method is a two-party authenticated key exchange (AKE) protocol, which can be used to authenticate all other participants´ session identifiers instead of using signatures. Based on the two- party AKE protocol, we propose an efficient insider-resistant GKE protocol without signatures. We show that our proposal is provably secure against insider attack if the underlying two-party AKE protocol is secure.
Keywords
cryptographic protocols; telecommunication security; insider attack; insider resistant group key exchange protocol; two party authenticated key exchange protocol; Access control; Communications Society; Computer science; Degradation; Information security; Layout; Message authentication; Proposals; Protocols; Resists;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications, 2009. ICC '09. IEEE International Conference on
Conference_Location
Dresden
ISSN
1938-1883
Print_ISBN
978-1-4244-3435-0
Electronic_ISBN
1938-1883
Type
conf
DOI
10.1109/ICC.2009.5198734
Filename
5198734
Link To Document