Skip to Main content Skip to Navigation
Conference papers

Analysis of VMSS Schemes for Group Key Transfer Protocol

Abstract : Known group key transfer protocols in group communications using classical secret sharing require that a t-degree interpolating polynomial be computed in order to encrypt and decrypt the secret group key. Secret sharing plays an important role in ensuring the group communications security. A verifiable multi-secret sharing (VMSS) scheme is a multi-secret sharing scheme with the verifiable property. Recently, Zhao et al. and Dehkordi et al. successively proposed two threshold VMSS schemes. Shortly, using the same verification mechanism, Dehkordi et al. presented another two VMSS schemes. In these schemes, authors claimed that the dealer was absolutely impossible to become a cheater. In this paper, we show that in both Zhao scheme and Dehkordi scheme, a dishonest dealer may distribute a fake share to a certain participant, and then that participant would subsequently never obtain the true secret. Indeed, verification mechanism should be improved in these schemes; and furthermore our results highlight that extra cautions still be exercised when constructing schemes in this direction.
Document type :
Conference papers
Complete list of metadata

Cited literature [3 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Friday, November 25, 2016 - 2:46:00 PM
Last modification on : Friday, September 11, 2020 - 2:54:26 PM
Long-term archiving on: : Tuesday, March 21, 2017 - 10:48:02 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Ching-Fang Hsu, Shan Wu. Analysis of VMSS Schemes for Group Key Transfer Protocol. 11th IFIP International Conference on Network and Parallel Computing (NPC), Sep 2014, Ilan, Taiwan. pp.555-558, ⟨10.1007/978-3-662-44917-2_51⟩. ⟨hal-01403141⟩



Record views


Files downloads