On the vulnerability of a Group Key Transfer protocol based on secret sharing

Ruxandra F. Olimid
{"title":"On the vulnerability of a Group Key Transfer protocol based on secret sharing","authors":"Ruxandra F. Olimid","doi":"10.1109/SACI.2014.6840053","DOIUrl":null,"url":null,"abstract":"Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted entity selects a private key and securely distributes it to the qualified participants. Hsu et al. introduced a GKT protocol based on secret sharing, which they claimed to be secure. Unlike their affirmation, we report a vulnerability: an insider can cancel key consistency such that at the end of the protocol distinct users own different keys. This leads to the futility of the protocol. Even more, the attacker is able to choose the values of the injected keys on his own wish. Finally, we propose a simple and efficient countermeasure that stands against the revealed attack.","PeriodicalId":163447,"journal":{"name":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","volume":"245 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 9th IEEE International Symposium on Applied Computational Intelligence and Informatics (SACI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SACI.2014.6840053","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Group Key Transfer (GKT) protocols allow multiple parties to share a common secret key: a trusted entity selects a private key and securely distributes it to the qualified participants. Hsu et al. introduced a GKT protocol based on secret sharing, which they claimed to be secure. Unlike their affirmation, we report a vulnerability: an insider can cancel key consistency such that at the end of the protocol distinct users own different keys. This leads to the futility of the protocol. Even more, the attacker is able to choose the values of the injected keys on his own wish. Finally, we propose a simple and efficient countermeasure that stands against the revealed attack.
基于秘密共享的组密钥传输协议的漏洞研究
组密钥传输(GKT)协议允许多方共享公共密钥:可信实体选择私钥并将其安全地分发给合格的参与者。Hsu等人引入了一种基于秘密共享的GKT协议,他们声称该协议是安全的。与他们的确认不同,我们报告了一个漏洞:内部人员可以取消密钥一致性,以便在协议结束时不同的用户拥有不同的密钥。这就导致了协议的无效。更重要的是,攻击者能够根据自己的意愿选择注入密钥的值。最后,我们提出了一种简单有效的对抗暴露攻击的对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信