Multi-party key agreement protocols indirectly assume that each principal equally contributes to the final form of the key. In this paper we consider three malleability attacks on multi-party key agreement protocols. The first attack, called strong key control allows a dishonest principal (or a group of principals) to fix the key to a pre-set value. The second attack is weak key control in which the key is still random, but the set from which the key is drawn is much smaller than expected. The third attack is named selective key control in which a dishonest principal (or a group of dishonest principals) is able to remove a contribution of honest principals to the group key. The paper discusses the above three attacks on several key agreemen...
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel,...
Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating ove...
Key agreement and digital signature are two significant and most useful contributions of modern cryp...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
[[abstract]]In 2000, Pieprzyk and Li proposed two multi-party key agreement protocols based on secre...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
[[abstract]]The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), bu...
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement prot...
In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (eph...
Abstract: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxi...
Part 9: CryptographyInternational audienceWu et al. proposed a key agreement to securely deliver a g...
Password-authenticated key exchange (PAKE) protocols allow two parties to share common secret keys i...
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel,...
Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating ove...
Key agreement and digital signature are two significant and most useful contributions of modern cryp...
[[abstract]]By its very nature, a non-authenticated multi-party key agreement protocol cannot provid...
[[abstract]]In 2000, Pieprzyk and Li proposed two multi-party key agreement protocols based on secre...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Key agreement protocols are a fundamental building block for ensuring authenticated and private com...
We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishme...
[[abstract]]The MQV key agreement protocol has been included in recent standards (IEEE and ANSI), bu...
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement prot...
In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (eph...
Abstract: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxi...
Part 9: CryptographyInternational audienceWu et al. proposed a key agreement to securely deliver a g...
Password-authenticated key exchange (PAKE) protocols allow two parties to share common secret keys i...
We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel,...
Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating ove...
Key agreement and digital signature are two significant and most useful contributions of modern cryp...