作者: Andrew C Yao , Yunlei Zhao , None
DOI: 10.1007/978-3-642-29952-0_26
关键词: Mathematics 、 Random oracle 、 Computer security model 、 Secrecy 、 Computational complexity theory 、 Key exchange 、 Adversary 、 Protocol (science) 、 Computer security 、 Hash function
摘要: In this work, we re-examine some fundamental group key-exchange and identity-based protocols, specifically the Burmester-Desmedet protocol [7] (referred to as BD-protocol) Chen-Kudla [9] CK-protocol). We identify new attacks on these showing in particular that protocols are not computationally fair. Specifically, with our attacks, an adversary can do following damages: It compute session-key output much lesser computational complexity than of victim honest player, maliciously nullify contributions from players. It set be pre-determined value, which efficiently publicly computed without knowing any secrecy supposed held by attacker. We remark beyond traditional security models for key-exchange, yet bring perspectives literature key-exchange. then present fixing approaches, prove fixed