• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting

Vol. 5, No. 4, April 28, 2011
10.3837/tiis.2011.04.011, Download Paper (Free):

Abstract

Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners' identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
M. Lim, B. Goi, S. G. Lee, "An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting," KSII Transactions on Internet and Information Systems, vol. 5, no. 4, pp. 822-839, 2011. DOI: 10.3837/tiis.2011.04.011.

[ACM Style]
Meng-Hui Lim, Bok-Min Goi, and Sang Gon Lee. 2011. An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting. KSII Transactions on Internet and Information Systems, 5, 4, (2011), 822-839. DOI: 10.3837/tiis.2011.04.011.

[BibTeX Style]
@article{tiis:19960, title="An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting", author="Meng-Hui Lim and Bok-Min Goi and Sang Gon Lee and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2011.04.011}, volume={5}, number={4}, year="2011", month={April}, pages={822-839}}