Abstract
Group key exchange protocols are cryptographic algorithms that describe how a group of parties can communicate with their common secret key over insecure public networks. In 2013, Olimid proposed an improved group key transfer protocol based on secret sharing, and claimed that he eliminated the flaws in Sun et al.’s group key transfer protocol. However, our analysis shows that the protocol is still vulnerable to outsider and insider attacks and does not provide known key security. In this paper, we show a detailed analysis of flaws in the protocol.
This research was supported by the MSIP(Ministry of Science, ICT&Future Planning), Korea, under the C-ITRC(Convergence Information Technology Research Center) support program (NIPA-2013-H0301-13-3007) supervised by the NIPA(National IT Industry Promotion Agency).
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Shamir, A.: How to share secret. Communications of the ACM 22(11), 612–613 (1979)
Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)
Nam, J., Paik, J., Kim, U.M., Won, D.: Resource-aware protocol for authenticated group key exchange in integrated wired and wireless networks. Journal of Information Sciences 177, 5441–5467 (2007)
Hajyvahabzadeh, M., Eidkhani, E., Mortazavi, S.A., Pour, A.N.: A new group key management protocol using code for key calculation: CKC. Information Science and Applications, 1–6 (2010)
Harn, L., Lin, C.: Authenticated group key transferprotocol based on secret sharing. IEEE Transactions on Computers 59(6), 842–846 (2010)
Nam, J., Paik, J., Won, D.: A security weakness in Abdalla et al.’s generic construction of a group key exchange protocol. Journal of Information Sciences 181(1), 234–238 (2011)
Nam, J., Kim, M., Paik, J., Won, D.: Security Weaknesses in Harn-Lin and Dutta-Barua protocols for group key establishment. KSII Transactions on Internet and Information Systems 6(2), 751–765 (2012)
Sun, Y., Wen, Q., Sun, H., Li, W., Jin, Z., Zhang, H.: An authenticated group key transferprotocol based on secret sharing. Procedia Engineering 9, 403–408 (2012)
Olimid, R.F.: On the security of an authenticated group key transfer protocol based on secret sharing. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds.) ICT-EurAsia 2013. LNCS, vol. 7804, pp. 399–408. Springer, Heidelberg (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, M., Park, N., Won, D. (2014). Security Analysis on a Group Key Transfer Protocol Based on Secret Sharing. In: Park, J., Adeli, H., Park, N., Woungang, I. (eds) Mobile, Ubiquitous, and Intelligent Computing. Lecture Notes in Electrical Engineering, vol 274. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40675-1_72
Download citation
DOI: https://doi.org/10.1007/978-3-642-40675-1_72
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40674-4
Online ISBN: 978-3-642-40675-1
eBook Packages: EngineeringEngineering (R0)