An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting
暂无分享,去创建一个
Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners' identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.
[1] Guorui Feng,et al. Reversible Watermarking Using Adaptive Edge-Guided Interpolation , 2011, KSII Trans. Internet Inf. Syst..