Security Weakness of Flexible Group Key Exchange with On-Demand Computation of Subgroup Keys

Qingfeng Cheng,Chuangui Ma
DOI: https://doi.org/10.48550/arXiv.1008.1221
2010-08-06
Abstract:In AFRICACRYPT 2010, Abdalla et al. first proposed a slight modification to the computations steps of the BD protocol, called mBD+P. Then they extended mBD+P protocol into mBD+S protocol. In this paper, we show that both of mBD+P and mBD+S protocols are vulnerable to malicious insiders attack. Further, we propose a simple countermeasure against this attack.
Cryptography and Security
What problem does this paper attempt to address?