A new hierarchical and scalable group key exchange protocol with XOR operation Online publication date: Thu, 16-Oct-2014
by Hongyuan Wang; Liehuang Zhu; Zhenghe Yang; Lejian Liao
International Journal of Wireless and Mobile Computing (IJWMC), Vol. 6, No. 4, 2013
Abstract: With the rapid development of the technology of group broadcast, distributed computation and wireless network, how to construct a secure Group Key Exchange (GKE) protocol for a number of participants on channels is drawing more and more attention. Meanwhile, security analysis of cryptographic protocol has been a hotspot. Symbolic analysis is a major approach to analyse the security of protocols. In this paper, we propose a GKE protocol originated from a two-participant key exchange protocol and prove that the protocol is secure. We represent the protocol as processes in the spi calculus, and state their security properties as queries in ProVerif, an automatic analyser based on spi calculus.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Wireless and Mobile Computing (IJWMC):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com