Automatic security analysis for group key exchange protocol: A case study in Burmester-Desmedt protocol

Ren Chunyang*, Wang Hongyuan, Zhang Zijian, Liao Lejian

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Canetti and Herzog have already proposed universally composable symbolic analysis (UCSA) for mutual authentication and key exchange protocols automatically without sacrificing the soundness of the cryptography. We want to extend their work to analyze group key exchange protocols. This paper takes the case of BD protocol with arbitrary participants against passive adversary (BD-Passive), and proves that BD-Passive is a secure group key exchange protocol. More specially, we (1) define the ideal functionality of BD-Passive; (2) prove the security property of BD-Passive in UC security framework by UCSA. Obviously, our work plays a new approach to prove group key exchange protocols automatically without sacrificing the soundness of the cryptography.

Original languageEnglish
Title of host publicationAdvances in Control and Communication
Pages17-20
Number of pages4
DOIs
Publication statusPublished - 2012
Event2nd International Conference of Electrical and Electronics Engineering, ICEEE 2011 - Macau, China
Duration: 1 Dec 20112 Dec 2011

Publication series

NameLecture Notes in Electrical Engineering
Volume137 LNEE
ISSN (Print)1876-1100
ISSN (Electronic)1876-1119

Conference

Conference2nd International Conference of Electrical and Electronics Engineering, ICEEE 2011
Country/TerritoryChina
CityMacau
Period1/12/112/12/11

Keywords

  • Burmester-Desmedt protocol
  • Ideal Functionality
  • Universally Composable
  • Universally Composable Symbolic Analysis

Fingerprint

Dive into the research topics of 'Automatic security analysis for group key exchange protocol: A case study in Burmester-Desmedt protocol'. Together they form a unique fingerprint.

Cite this