Cryptology ePrint Archive: Report 2006/388
Survey on Security Requirements and Models for Group Key Exchange
Abstract: In this report we provide an analytical survey on security issues that are relevant for group key exchange (GKE) protocols. We start with the description of the security requirements that have been informally described in the literature and widely used to analyze security of earlier GKE protocols. Most of these definitions were originally stated for two-party protocols and then adapted to a group setting. These informal definitions are foundational for the later appeared formal security models for GKE protocols whose development, strengths, and weaknesses are also described and analyzed.
Category / Keywords: cryptographic protocols / group key exchange, security requirements, models, survey, analysis
Publication Info: Technical Report of Horst Goertz Institute for IT Security Nr. 2006/02
Date: received 4 Nov 2006, last revised 5 Jan 2008
Contact author: mark manulis at rub de
Available formats: PDF | BibTeX Citation
Note: Some changes in Sec. 3.9 and 4. New Section 3.11.
Version: 20080105:223212 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]