National Changhua University of Education Institutional Repository : Item 987654321/12156
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 6507/11669
Visitors : 29718916      Online Users : 377
RC Version 3.2 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Adv. Search
LoginUploadHelpAboutAdminister
NCUEIR > College of Science > math > Periodical Articles >  Item 987654321/12156

Please use this identifier to cite or link to this item: http://ir.ncue.edu.tw/ir/handle/987654321/12156

Title: A Robust Multi-Party Key Agreement Protocol Resistant to Malicious Participants
Authors: Tseng, Yuh-Min
Contributors: 數學系
Date: 2005
Issue Date: 2012-07-03T03:44:30Z
Publisher: British Computer Society
Abstract: By its very nature, a non-authenticated multi-party key agreement protocol cannot provide participant and message authentication, so it must rely on an authenticated network channel. This paper presents the inability of two famous multi-party key agreement protocols to withstand malicious participant attacks, even though their protocols are based on the authenticated network channel. This attack involves a malicious participant disrupting the multi-party key agreement among honest participants. In this case, other honest participants do not correctly agree on a common key. Obviously, the malicious participant cannot obtain the common key either, and the communication confidentiality among participants is not breached. However, in some emergency situations or applications, a multi-party key agreement protocol design that is resistant to malicious participants is useful. Therefore, in this paper, a non-authenticated multi-party key agreement protocol resistant to malicious participants is proposed. The proposed robust protocol requires constant rounds to establish a common key. Each participant broadcasts a constant number of messages. Under the assumption of the Decision Diffie–Hellman problem and the random oracle model, we will show that the proposed protocol is provably secure against passive adversaries and malicious participants.
Relation: The Computer Journal, 48(4): 480-487
Appears in Collections:[math] Periodical Articles

Files in This Item:

File SizeFormat
index.html0KbHTML532View/Open


All items in NCUEIR are protected by copyright, with all rights reserved.

 


DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback