In this work, we introduce an active attack on a Group Key Exchange protocol by Burmester and Desmedt. The attacker obtains a copy of the shared key, which is created in a collaborative manner with the legal users in a communication group.
Citation: |
[1] |
M. Burmester and I. Desmedt, A secure and efficient conference key distribution system, Lecture Notes in Comput. Sci., 950 (1995), 275-286.
![]() |
[2] |
M. Burmester and I. Desmedt, A secure and scalable Group Key Exchange system, Information Proc. Letters, 94 (2005), 137-143.
doi: 10.1016/j.ipl.2005.01.003.![]() ![]() ![]() |
[3] |
W. D. Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, 22 (1976), 644-654.
![]() ![]() |
[4] |
P. P. C. Lee, J. C. S. Lui and D. K. Y. Yau, Distributed collaborative key agreement and authentication protocols for dynamic peer Groups, IEEE/ACM Trans. Networking, 14 (2006), 263-276.
doi: 10.1109/TNET.2006.872575.![]() ![]() |
[5] |
R. Schnyder, J. A. Lopez-Ramos, J. Rosenthal and D. Schipani, An active attack on a multiparty key exchange protocol, Journal of Algebra Combinatorics Discrete Structures and Applications, 3 (2016), 31-36.
![]() ![]() |
[6] |
M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman key distribution extended to group communication, Proceedings of the 3rd ACM Conference on Computer and Communications Security, (1996), 31-37.
doi: 10.1145/238168.238182.![]() ![]() |
[7] |
M. Steiner, G. Tsudik and M. Waidner, Key agreement in dynamic peer groups, IEEE Transactions of Parallel and Distributed Systems, 11 (2000), 769-780.
doi: 10.1109/71.877936.![]() ![]() |
[8] |
J. Van der Merwe, D. Dawoud and S. McDonald, A survey on peer-to-peer key management for mobile ad hoc networks, ACM Computing Surveys, 39 (2007).
doi: 10.1145/1216370.1216371.![]() ![]() |
[9] |
S. -H. Yang,
Wireless Sensor Networks. Principles, Desing and Applications, Springer-Verlag, London, 2014.
![]() |