Paper 2006/388

Survey on Security Requirements and Models for Group Key Exchange

Mark Manulis

Abstract

In this report we provide an analytical survey on security issues that are relevant for group key exchange (GKE) protocols. We start with the description of the security requirements that have been informally described in the literature and widely used to analyze security of earlier GKE protocols. Most of these definitions were originally stated for two-party protocols and then adapted to a group setting. These informal definitions are foundational for the later appeared formal security models for GKE protocols whose development, strengths, and weaknesses are also described and analyzed.

Note: Some changes in Sec. 3.9 and 4. New Section 3.11.

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Published elsewhere. Technical Report of Horst Goertz Institute for IT Security Nr. 2006/02
Keywords
group key exchangesecurity requirementsmodelssurveyanalysis
Contact author(s)
mark manulis @ rub de
History
2008-01-05: last of 2 revisions
2006-11-05: received
See all versions
Short URL
https://ia.cr/2006/388
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/388,
      author = {Mark Manulis},
      title = {Survey on Security Requirements and Models for Group Key Exchange},
      howpublished = {Cryptology ePrint Archive, Paper 2006/388},
      year = {2006},
      note = {\url{https://eprint.iacr.org/2006/388}},
      url = {https://eprint.iacr.org/2006/388}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.