2016
DOI: 10.1093/comjnl/bxw061
|View full text |Cite
|
Sign up to set email alerts
|

On the (In)Security of Recent Group Key Distribution Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 37 publications
0
13
0
Order By: Relevance
“…Indeed, there is no reason to believe that a secure scheme can be designed using the underlying approach adopted in all three cases. As observed in Section 1, many related polynomial-based group key distribution schemes have been shown to be flawed [2][3][4][5][6]. Again as observed above, there are many existing schemes which achieve the same objectives in an efficient way and which have rigorous proofs of security-see, e.g.…”
Section: Discussionmentioning
confidence: 99%
“…Indeed, there is no reason to believe that a secure scheme can be designed using the underlying approach adopted in all three cases. As observed in Section 1, many related polynomial-based group key distribution schemes have been shown to be flawed [2][3][4][5][6]. Again as observed above, there are many existing schemes which achieve the same objectives in an efficient way and which have rigorous proofs of security-see, e.g.…”
Section: Discussionmentioning
confidence: 99%
“…• insider attacks of various attacks appear impossible to prevent, as many authors have observed (see, for example, [11,12,13], and the papers cited therein).…”
Section: Introductionmentioning
confidence: 99%
“…3,4 This is because most broadcast environments allow any user to receive the broadcast information. 2,6 A group key establishment protocol is secure if only authorized users are allowed to reconstruct the group key in question. That is, a sender broadcasts encrypted messages.…”
Section: Introductionmentioning
confidence: 99%
“…3,4 This is because most broadcast environments allow any user to receive the broadcast information. 5,6 A common way to ensure secure group communication is to encrypt the messages using a key, 5 called group key. That is, a sender broadcasts encrypted messages.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation