Welcome to the resource topic for 2005/395
Secure Group Key Establishment Revisited
Authors: Jens-Matthias Bohli, Maria Isabel Gonzalez Vasco, Rainer SteinwandtAbstract:
We examine the popular proof models for group key establishment of
Bresson et al. and point out missing security
properties that are present in some models for two-party key
establishment. These properties are actually of more importance
in group key establishments due to the possibility of malicious
insiders. We show that established group key establishment
schemes from CRYPTO 2003 and ASIACRYPT 2004 do
not fully meet these new requirements. Next to giving a formal
definition of these extended security properties, we prove a
variant of the explored proposal from ASIACRYPT 2004
secure in this stricter sense.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .