On Classifying Conference Key Distribution Protocols

  • Authors:
  • Shahrokh Saeednia;Reihaneh Safavi-Naini;Willy Susilo

  • Affiliations:
  • -;-;-

  • Venue:
  • ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we examine a classification of conference key distribution protocols proposed in [4] and show that no known protocol satisfies the security requirements in class 4, the highest security class of this classification. We show two new attacks on protocols that were believed to belong to the highest security class and show that both protocols in fact belong to class 3. This motivates us to propose a refinement of this classification to allow separating protocols with different security properties while maintaining the classification framework.