An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Communications of the ACM
Using encryption for authentication in large networks of computers
Communications of the ACM
Conference Key Agreement from Secret Sharing
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Perfectly-Secure Key Distribution for Dynamic Conferences
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Generation of key predistribution schemes using secret sharing schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Authenticated Group Key Transfer Protocol Based on Secret Sharing
IEEE Transactions on Computers
Cryptanalysis of a group key transfer protocol based on secret sharing
FGIT'11 Proceedings of the Third international conference on Future Generation Information Technology
New directions in cryptography
IEEE Transactions on Information Theory
A conference key distribution system
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Group key transfer protocols allow multiple parties to share a common secret key. They rely on a mutually trusted key generation center (KGC) that selects the key and securely distributes it to the authorized participants. Recently, Sun et al. proposed an authenticated group key transfer protocol based on secret sharing that they claim to be secure. We show that this is false: the protocol is susceptible to insider attacks and violates known key security. Finally, we propose a countermeasure that maintains the benefits of the original protocol.