2008
DOI: 10.1145/2043628.2043629
|View full text |Cite
|
Sign up to set email alerts
|

Modeling key compromise impersonation attacks on group key exchange protocols

Abstract: Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, an important security attribute called key compromise impersonation (KCI) resilience has been completely ignored for the case of GKE protocols. Informally, a protocol is said to provide KCI resilience if the compromise of the long… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
2

Relationship

4
2

Authors

Journals

citations
Cited by 27 publications
(36 citation statements)
references
References 26 publications
0
36
0
Order By: Relevance
“…This model extends strongly-authenticated key exchange model for two-party protocols from [32] to the group setting and it is described using notations and terminology of the state-of-the-art GKE model [19].…”
Section: The Model and Security Definitionsmentioning
confidence: 99%
See 2 more Smart Citations
“…This model extends strongly-authenticated key exchange model for two-party protocols from [32] to the group setting and it is described using notations and terminology of the state-of-the-art GKE model [19].…”
Section: The Model and Security Definitionsmentioning
confidence: 99%
“…[14,24,15,25,32,37,16], and group KE (GKE), e.g. [10,29,22,12,31,19], reaching out to other flavors such as password-based solutions [8,6,9,3] or flexible combinations of GKE and 2KE [30,1]. The security notion, shared by most KE flavors, takes its roots in [7] and is called authenticated key exchange (AKE) security.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security of key exchange protocols is usually defined with the requirement of Authenticated Key Exchange (AKE) security; see [3,14,15,26] for the 2KE case and [8,10,18,21,22] for the GKE case. AKE-security models the indistinguishability of the established session group key with respect to an active adversary treated as an external entity from the perspective of the attacked session.…”
Section: Related Workmentioning
confidence: 99%
“…Besides AKE-security some security models for GKE protocols (e.g. [10,11,18,21]) define optional security against insider attacks.…”
Section: Related Workmentioning
confidence: 99%