In group key exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long-lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task - the aim of our article. We start by investigating the current setting of strong corruptions and derive some refinements like opening attacks that allow to reveal ephemeral secrets of users without their long-lived keys. This allows to consider even stron...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...
In this paper we overview a large number of currently known group key ex-change protocols while focu...
The existence of malicious participants is a major threat for authenticated group key exchange (AGKE...
Abstract: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxi...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
With the rapid development of cloud computing and mobile networks, more and more application scenari...
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their ...
Secure group protocols are not easy to design: this paper will show new attacks found against a prot...
Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakag...
Recently Harn and Lin proposed a novel authenticated group key transfer protocol that a mutually tru...
We examine the popular proof models for group key establishment of Bresson et al. and point out miss...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...
In this paper we overview a large number of currently known group key ex-change protocols while focu...
The existence of malicious participants is a major threat for authenticated group key exchange (AGKE...
Abstract: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxi...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models consideri...
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participan...
With the rapid development of cloud computing and mobile networks, more and more application scenari...
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their ...
Secure group protocols are not easy to design: this paper will show new attacks found against a prot...
Recent advances in the design and analysis of secure two-party key exchange (2KE) such as the leakag...
Recently Harn and Lin proposed a novel authenticated group key transfer protocol that a mutually tru...
We examine the popular proof models for group key establishment of Bresson et al. and point out miss...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...
In this paper we make progress towards solving an open problem posed by Katz and Yung at CRYPTO 2003...
In this paper we overview a large number of currently known group key ex-change protocols while focu...
The existence of malicious participants is a major threat for authenticated group key exchange (AGKE...