(1) It can compute the session-key output with much lesser computational complexity than that of the victim honest player, and can maliciously nullify the contributions from the victim honest players.
(2) It can set the session-key output to be some pre-determined value, which can be efficiently and publicly computed without knowing any secrecy supposed to be held by the attacker. We remark these attacks are beyond the traditional security models for group key-exchange and identity-based key-exchange.
Then, based on the computationally fair Diffie-Hellman key- exchange in [21], we present some fixing approaches, and prove that the fixed protocols are computationally fair.
Category / Keywords: cryptographic protocols / Date: received 22 May 2012 Contact author: yunleizhao at gmail com Available format(s): PDF | BibTeX Citation Version: 20120529:201709 (All versions of this report) Short URL: ia.cr/2012/287 Discussion forum: Show discussion | Start new discussion