• DocumentCode
    3255155
  • Title

    Event-B based invariant checking of secrecy in group key protocols

  • Author

    Gawanmeh, Amjad ; Tahar, Sofiène ; Ayed, L.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Concordia Univ., Montreal, QC
  • fYear
    2008
  • fDate
    14-17 Oct. 2008
  • Firstpage
    950
  • Lastpage
    957
  • Abstract
    The correctness of group key protocols in communication systems remains a great challenge because of dynamic characteristics of group key construction as we deal with an open number of group members. In this paper, we propose a solution to model group key protocols and to verify their required properties, in particular secrecy property, using the event-B method. Event-B deals with tools allowing invariant checking, and can be used to verify group key secrecy property. We define a well-formed formal link between the group protocol model and the event-B counterpart model. Our approach is applied on a tree-based group Diffie-Hellman protocol that dynamically outputs group keys using the logical structure of a balanced binary tree.
  • Keywords
    cryptographic protocols; telecommunication security; trees (mathematics); Diffie-Hellman protocol; binary tree; event-B based invariant checking; group key protocols; secrecy; Binary trees; Data security; Electronic mail; Information security; Laboratories; Libraries; Logic; Protocols; Robustness; Unified modeling language;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on
  • Conference_Location
    Montreal, Que
  • Print_ISBN
    978-1-4244-2412-2
  • Electronic_ISBN
    978-1-4244-2413-9
  • Type

    conf

  • DOI
    10.1109/LCN.2008.4664308
  • Filename
    4664308