A new hierarchical and scalable group key exchange protocol with XOR operation

  • Authors:
  • Hongyuan Wang;Liehuang Zhu;Zhenghe Yang;Lejian Liao

  • Affiliations:
  • Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, ...;Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, ...;Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, ...;Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, ...

  • Venue:
  • International Journal of Wireless and Mobile Computing
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the rapid development of the technology of group broadcast, distributed computation and wireless network, how to construct a secure Group Key Exchange GKE protocol for a number of participants on channels is drawing more and more attention. Meanwhile, security analysis of cryptographic protocol has been a hotspot. Symbolic analysis is a major approach to analyse the security of protocols. In this paper, we propose a GKE protocol originated from a two-participant key exchange protocol and prove that the protocol is secure. We represent the protocol as processes in the spi calculus, and state their security properties as queries in ProVerif, an automatic analyser based on spi calculus.