Abstract
A modular method which derives a scalable construction of a group key exchange (GKE) scheme from a two-party key exchange (KE) one is presented. By combining the method presented with the compiler by Katz and Yung [1] a scalable compiler can be obtained that transforms any two-party KE protocol secure against a passive eavesdropper to an authenticated GKE one secure against a stronger active adversary.
Original language | English |
---|---|
Pages (from-to) | 728-729 |
Number of pages | 2 |
Journal | Electronics Letters |
Volume | 40 |
Issue number | 12 |
DOIs | |
Publication status | Published - 2004 Jun 10 |
ASJC Scopus subject areas
- Electrical and Electronic Engineering