Paper 2006/388

Survey on Security Requirements and Models for Group Key Exchange

Mark Manulis


In this report we provide an analytical survey on security issues that are relevant for group key exchange (GKE) protocols. We start with the description of the security requirements that have been informally described in the literature and widely used to analyze security of earlier GKE protocols. Most of these definitions were originally stated for two-party protocols and then adapted to a group setting. These informal definitions are foundational for the later appeared formal security models for GKE protocols whose development, strengths, and weaknesses are also described and analyzed.

Note: Some changes in Sec. 3.9 and 4. New Section 3.11.

Available format(s)
Cryptographic protocols
Publication info
Published elsewhere. Technical Report of Horst Goertz Institute for IT Security Nr. 2006/02
group key exchangesecurity requirementsmodelssurveyanalysis
Contact author(s)
mark manulis @ rub de
2008-01-05: last of 2 revisions
2006-11-05: received
See all versions
Short URL
Creative Commons Attribution


      author = {Mark Manulis},
      title = {Survey on Security Requirements and Models for Group Key Exchange},
      howpublished = {Cryptology ePrint Archive, Paper 2006/388},
      year = {2006},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.