Paper 2006/388
Survey on Security Requirements and Models for Group Key Exchange
Mark Manulis
Abstract
In this report we provide an analytical survey on security issues that are relevant for group key exchange (GKE) protocols. We start with the description of the security requirements that have been informally described in the literature and widely used to analyze security of earlier GKE protocols. Most of these definitions were originally stated for two-party protocols and then adapted to a group setting. These informal definitions are foundational for the later appeared formal security models for GKE protocols whose development, strengths, and weaknesses are also described and analyzed.
Note: Some changes in Sec. 3.9 and 4. New Section 3.11.
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Published elsewhere. Technical Report of Horst Goertz Institute for IT Security Nr. 2006/02
- Keywords
- group key exchangesecurity requirementsmodelssurveyanalysis
- Contact author(s)
- mark manulis @ rub de
- History
- 2008-01-05: last of 2 revisions
- 2006-11-05: received
- See all versions
- Short URL
- https://ia.cr/2006/388
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2006/388, author = {Mark Manulis}, title = {Survey on Security Requirements and Models for Group Key Exchange}, howpublished = {Cryptology {ePrint} Archive, Paper 2006/388}, year = {2006}, url = {https://eprint.iacr.org/2006/388} }