Formal verification in Joux tripartite Drffie-Hellman protocol

Liehuang Zhu*, Zijian Zhang, Feng Wang, Cong Guo, Caixia Yuan

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Security analysis of cryptographic protocols has been widely studied for many years. As far as we know, we have not found any methods to effectively analyze group key exchange protocols for the three parties yet, which did not sacrifice the soundness of cryptography. Recently, Canetti and Herzog have proposed Universally Compos able Symbolic Analysis (UCSA) of two-party mutual authentication and key exchange protocol which is based on the symmetric encryption schemes. This scheme can analyze the protocols automatically and guarantee the soundness of cryptography. Therefore, we discuss group key exchange protocol which is based on Joux Tripartite Diffie-Hellman (JTDH) using UCSA Our contribution is analyzing group key exchange protocol effectively without damaging the soundness of cryptography.

Original languageEnglish
Pages (from-to)153-163
Number of pages11
JournalChina Communications
Volume9
Issue number3
Publication statusPublished - 15 Mar 2012

Keywords

  • Computationally sound
  • Group key exchange protocol
  • JTDH
  • UCSA

Fingerprint

Dive into the research topics of 'Formal verification in Joux tripartite Drffie-Hellman protocol'. Together they form a unique fingerprint.

Cite this