An insider-resistant group key exchange protocol without signatures

Huang Hai, Cao Zhenfu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The well-known method for a group key exchange (GKE) protocol to be against insider attack is to make use of signatures. However, using signatures considerably degrades the performance of the GKE protocol. In this paper, we propose a new method to resist insider attack. The underlying tool of our method is a two-party authenticated key exchange (AKE) protocol, which can be used to authenticate all other participants' session identifiers instead of using signatures. Based on the two-party AKE protocol, we propose an efficient insider-resistant GKE protocol without signatures. We show that our proposal is provably secure against insider attack if the underlying two-party AKE protocol is secure.

Original languageEnglish
Title of host publicationProceedings - 2009 IEEE International Conference on Communications, ICC 2009
DOIs
StatePublished - 2009
Externally publishedYes
Event2009 IEEE International Conference on Communications, ICC 2009 - Dresden, Germany
Duration: 14 Jun 200918 Jun 2009

Publication series

NameIEEE International Conference on Communications
ISSN (Print)0536-1486

Conference

Conference2009 IEEE International Conference on Communications, ICC 2009
Country/TerritoryGermany
CityDresden
Period14/06/0918/06/09

Keywords

  • AKE
  • Group key exchange
  • Insider attack
  • Signature

Fingerprint

Dive into the research topics of 'An insider-resistant group key exchange protocol without signatures'. Together they form a unique fingerprint.

Cite this