The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols showed to be flawed in 2001. Even though the corresponding attacks (or some variants of them) have been rediscovered in several different frameworks, no fixed version of these protocols has been proposed until now. In this paper, we prove that it is in fact impossible to design a scalable authenticated group key agreement protocol based on the same design assumptions as the A-GDH ones. We proceed by providing a systematic way to derive an attack against any A-GDH-type protocol with at least four participants and exhibit protocols with two and three participants which we cannot break using our technique. As far as we know, this is the first generic insecurity result reporte...
Protocols for group key exchange are cryptographic algorithms that allow a group of parties communic...
In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (eph...
AbstractIn 2009, Zheng et al. proposed an efficient password-based group key agreement protocol resi...
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols were shown to be flawed at CSFW...
Secure group protocols are not easy to design: this paper will show new attacks found against a prot...
Authenticated Group Key Agreement Protocols are protocols allowing a group of principals to contribu...
During the last few years, a number of authenticated group key agreement protocols have been propose...
The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting....
Abstract. In this paper we analyse the security of two authenticated group key agreement schemes bas...
In this paper we analyse the security of two authenticated group key agreement schemes based on the ...
There have been numerous studies performed on secure group communication over unsecured channels suc...
Recently Harn and Lin proposed a novel authenticated group key transfer protocol that a mutually tru...
We consider the fundamental problem of authenticated group key exchange among n parties within a lar...
[[abstract]]In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) p...
AbstractAuthenticated key agreement protocols are to authenticate the users who will start a convers...
Protocols for group key exchange are cryptographic algorithms that allow a group of parties communic...
In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (eph...
AbstractIn 2009, Zheng et al. proposed an efficient password-based group key agreement protocol resi...
The A-GDH.2 and SA-GDH.2 authenticated group key agreement protocols were shown to be flawed at CSFW...
Secure group protocols are not easy to design: this paper will show new attacks found against a prot...
Authenticated Group Key Agreement Protocols are protocols allowing a group of principals to contribu...
During the last few years, a number of authenticated group key agreement protocols have been propose...
The Cliques protocols are extensions of the Diffie-Hellman key exchange protocol to a group setting....
Abstract. In this paper we analyse the security of two authenticated group key agreement schemes bas...
In this paper we analyse the security of two authenticated group key agreement schemes based on the ...
There have been numerous studies performed on secure group communication over unsecured channels suc...
Recently Harn and Lin proposed a novel authenticated group key transfer protocol that a mutually tru...
We consider the fundamental problem of authenticated group key exchange among n parties within a lar...
[[abstract]]In PKC 2004, Choi et al. proposed an ID-based authenticated group key agreement (AGKA) p...
AbstractAuthenticated key agreement protocols are to authenticate the users who will start a convers...
Protocols for group key exchange are cryptographic algorithms that allow a group of parties communic...
In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (eph...
AbstractIn 2009, Zheng et al. proposed an efficient password-based group key agreement protocol resi...