Analysis of VMSS Schemes for Group Key Transfer Protocol - Network and Parallel Computing Access content directly
Conference Papers Year : 2014

Analysis of VMSS Schemes for Group Key Transfer Protocol

Abstract

Known group key transfer protocols in group communications using classical secret sharing require that a t-degree interpolating polynomial be computed in order to encrypt and decrypt the secret group key. Secret sharing plays an important role in ensuring the group communications security. A verifiable multi-secret sharing (VMSS) scheme is a multi-secret sharing scheme with the verifiable property. Recently, Zhao et al. and Dehkordi et al. successively proposed two threshold VMSS schemes. Shortly, using the same verification mechanism, Dehkordi et al. presented another two VMSS schemes. In these schemes, authors claimed that the dealer was absolutely impossible to become a cheater. In this paper, we show that in both Zhao scheme and Dehkordi scheme, a dishonest dealer may distribute a fake share to a certain participant, and then that participant would subsequently never obtain the true secret. Indeed, verification mechanism should be improved in these schemes; and furthermore our results highlight that extra cautions still be exercised when constructing schemes in this direction.
Fichier principal
Vignette du fichier
978-3-662-44917-2_51_Chapter.pdf (269.19 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01403141 , version 1 (25-11-2016)

Licence

Attribution

Identifiers

Cite

Ching-Fang Hsu, Shan Wu. Analysis of VMSS Schemes for Group Key Transfer Protocol. 11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.555-558, ⟨10.1007/978-3-662-44917-2_51⟩. ⟨hal-01403141⟩
48 View
68 Download

Altmetric

Share

Gmail Facebook X LinkedIn More