Abstract | ||
---|---|---|
Group key establishment protocols allow a set of communicating parties to establish a common secret key. Due to their significance in building a secure multicast channel, a number of group key establishment protocols have been suggested over the years for a variety of settings. Among the many protocols is Harn and Lin's group key transfer protocol based on Shamir's secret sharing. This group key transfer protocol was designed to work in the setting where a trusted key generation center shares a long-term secret with each of its registered users. As for security, Harn and Lin claim that their protocol prevents the long-term secret of each user from being disclosed to other users. But, we found this claim is not true. Unlike the claim, Harn and Lin's protocol cannot protect users' long-term secrets against a malicious user. We here report this security problem with the protocol and show how to address it. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1007/978-3-642-27142-7_36 | FGIT |
Keywords | Field | DocType |
secret sharing,key generation center share,security problem,group key transfer protocol,malicious user,registered user,lin claim,common secret key,group key establishment protocol,long-term secret,security,replay attack | Key distribution,Group key,Secure multi-party computation,Secret sharing,Computer security,Computer science,Verifiable secret sharing,Homomorphic secret sharing,Key-agreement protocol,Pre-shared key | Conference |
Volume | ISSN | Citations |
7105 | 0302-9743 | 11 |
PageRank | References | Authors |
0.92 | 7 | 6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Junghyun Nam | 1 | 357 | 47.86 |
Moonseong Kim | 2 | 143 | 39.75 |
Juryon Paik | 3 | 147 | 24.72 |
Woongryul Jeon | 4 | 150 | 14.64 |
Byunghee Lee | 5 | 60 | 6.19 |
Dongho Won | 6 | 1262 | 154.14 |