University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Contributory Group Key Exchange in the Presence of Malicious Participants

Bresson, E and Manulis, M (2008) Contributory Group Key Exchange in the Presence of Malicious Participants IET Information Security, 2 (3). pp. 85-93.

Full text not available from this repository.

Abstract

In a group key exchange (GKE) protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol's output: misbehaving participants might have personal advantage in influencing the value of the group key. In fact, the absence of trust relationship is the main feature of GKE (when compared with group key transport) protocols. The existing notions of security are enlarged by identifying limitations in some previously proposed security models while taking into account different types of corruptions (weak and strong). To illustrate these notions, two efficient and provably secure generic solutions, compilers, are presented.

Item Type: Article
Authors :
NameEmailORCID
Bresson, EUNSPECIFIEDUNSPECIFIED
Manulis, Mm.manulis@surrey.ac.ukUNSPECIFIED
Date : 2008
Identification Number : https://doi.org/10.1049/iet-ifs:20070113
Depositing User : Symplectic Elements
Date Deposited : 17 May 2017 12:21
Last Modified : 17 May 2017 15:03
URI: http://epubs.surrey.ac.uk/id/eprint/835016

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year


Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800