A modular method which derives a scalable construction of a group key exchange (GKE) scheme from a two-party key exchange (KE) one is presented. By combining the method presented with the compiler by Katz and Yung  a scalable compiler can be obtained that transforms any two-party KE protocol secure against a passive eavesdropper to an authenticated GKE one secure against a stronger active adversary.
|Number of pages||2|
|Publication status||Published - 2004 Jun 10|
ASJC Scopus subject areas
- Electrical and Electronic Engineering