首页> 外文OA文献 >Modeling key compromise impersonation attacks on group key exchange protocols
【2h】

Modeling key compromise impersonation attacks on group key exchange protocols

机译:对组密钥交换协议上的密钥泄露模拟攻击建模

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
机译:密钥交换协议允许一组各方在公共网络上就秘密会话密钥达成协议。两方密钥交换(2PKE)协议已在考虑不同对抗行为的各种模型下进行了严格分析。但是,组密钥交换(GKE)协议的分析尚未像2PKE协议那样广泛。特别是,到目前为止,对于GKE协议,密钥泄露模拟(KCI)弹性的安全属性已被忽略。我们首先对GKE协议的安全性进行建模,以应对外部和内部对手的KCI攻击。然后,我们证明了一些现有协议即使抵御外部KCI攻击也是不安全的。对这些协议的攻击表明有必要考虑GCI协议的KCI弹性。最后,我们在假设随机预言的情况下,通过修改后的模型为现有GKE协议提供了新的安全性证明。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号