Title: A new hierarchical and scalable group key exchange protocol with XOR operation

Authors: Hongyuan Wang; Liehuang Zhu; Zhenghe Yang; Lejian Liao

Addresses: Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China ' Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China ' Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China ' Beijing Engineering Research Center of Massive Language Information Processing and Cloud Computing Application, School of Computer Science and Technology, Beijing Institute of Technology, Beijing, China

Abstract: With the rapid development of the technology of group broadcast, distributed computation and wireless network, how to construct a secure Group Key Exchange (GKE) protocol for a number of participants on channels is drawing more and more attention. Meanwhile, security analysis of cryptographic protocol has been a hotspot. Symbolic analysis is a major approach to analyse the security of protocols. In this paper, we propose a GKE protocol originated from a two-participant key exchange protocol and prove that the protocol is secure. We represent the protocol as processes in the spi calculus, and state their security properties as queries in ProVerif, an automatic analyser based on spi calculus.

Keywords: symbolic analysis; spi calculus; ProVerif; group key exchange protocol; XOR; security analysis; cryptography.

DOI: 10.1504/IJWMC.2013.056550

International Journal of Wireless and Mobile Computing, 2013 Vol.6 No.4, pp.355 - 361

Received: 21 May 2013
Accepted: 28 May 2013

Published online: 16 Oct 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article