ACM Transactions on Computer Systems (TOCS)
A calculus for cryptographic protocols: the spi calculus
Proceedings of the 4th ACM conference on Computer and communications security
Verifying Authentication Protocols in CSP
IEEE Transactions on Software Engineering
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Athena: a novel approach to efficient automatic security protocol analysis
Journal of Computer Security
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On the performance of group key agreement protocols
ACM Transactions on Information and System Security (TISSEC)
Modeling insider attacks on group key-exchange protocols
Proceedings of the 12th ACM conference on Computer and communications security
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series)
Scalable Protocols for Authenticated Group Key Exchange
Journal of Cryptology
International Journal of Wireless and Mobile Computing
Security mechanisms and vulnerabilities in the IEEE 802.15.3 wireless personal area networks
International Journal of Wireless and Mobile Computing
The performance of a watchdog protocol for wireless network security
International Journal of Wireless and Mobile Computing
On the security of public key protocols
SFCS '81 Proceedings of the 22nd Annual Symposium on Foundations of Computer Science
Computational soundness of observational equivalence
Proceedings of the 15th ACM conference on Computer and communications security
Key agreement for heterogeneous mobile ad-hoc groups
International Journal of Wireless and Mobile Computing
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
Journal of Automated Reasoning
Security protocol verification: symbolic and computational models
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
With the rapid development of the technology of group broadcast, distributed computation and wireless network, how to construct a secure Group Key Exchange GKE protocol for a number of participants on channels is drawing more and more attention. Meanwhile, security analysis of cryptographic protocol has been a hotspot. Symbolic analysis is a major approach to analyse the security of protocols. In this paper, we propose a GKE protocol originated from a two-participant key exchange protocol and prove that the protocol is secure. We represent the protocol as processes in the spi calculus, and state their security properties as queries in ProVerif, an automatic analyser based on spi calculus.