Computationally sound and effective symbolic analysis of group key exchange protocols

Zi Jian Zhang, Lie Huang Zhu*, Feng Wang, Le Jian Liao

*此作品的通讯作者

科研成果: 期刊稿件文章同行评审

1 引用 (Scopus)

摘要

The computational soundness of symbolic analysis is always argued, because the cryptographic primitives are viewed as black boxes, and the specific security properties of those cryptographic primitives have not been considered yet. Moreover, this kind of approaches is ineffective, when it is used to analyze group key exchange protocols with a large number of participants. This paper considers those problems above, and proposes computationally sound and effective symbolic analysis of group key exchange protocols. More specifically, we design a pattern function for symbolic expression, so as to define the concrete security properties that modular exponentiation operation needs satisfy. Based on that, we prove the symbolic analysis of Burmester-Desmedt protocol is computationally sound in universally composable security framework. Furthermore, we use mathematical inductive method to prove the security of Burmester-Desmedt protocol is unrelated to the number of participants. The number of the participants does not affect symbolic analysis. As a result, the efficiency of symbolic analysis is improved.

源语言英语
页(从-至)664-672
页数9
期刊Jisuanji Xuebao/Chinese Journal of Computers
35
4
DOI
出版状态已出版 - 4月 2012

指纹

探究 'Computationally sound and effective symbolic analysis of group key exchange protocols' 的科研主题。它们共同构成独一无二的指纹。

引用此