Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model

dc.contributor.authorSharma, P.
dc.contributor.authorPurushothama, B.R.
dc.date.accessioned2026-02-04T12:25:10Z
dc.date.issued2024
dc.description.abstractThere have been several proposed methods in the literature for securely distributing group keys and managing group dynamics for secure group communications. While these methods claim to be secure against passive adversaries, our focus has been on a more powerful adversary known as a strong active outsider adversary. This adversary has the ability to corrupt legitimate users, which can result in the leakage of crucial secret information to the adversary. Such information can enable the adversary to recover both current and past group keys. One commonly utilized approach for ensuring secure group communication is group key management schemes based on the Chinese remainder theorem (CRT). In this paper, we evaluate prominent CRT-based key management schemes in the presence of an active adversary. Our findings indicate that the adversary can exploit the leaked information of the corrupted user to break backward secrecy. As a result, we demonstrate that the CRT-based schemes found in the literature are insecure against strong active adversaries and are therefore unsuitable for practical applications. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
dc.identifier.citationWireless Personal Communications, 2024, 134, 3, pp. 1299-1321
dc.identifier.issn9296212
dc.identifier.urihttps://doi.org/10.1007/s11277-024-10925-7
dc.identifier.urihttps://idr.nitk.ac.in/handle/123456789/21286
dc.publisherSpringer
dc.subjectActive adversary
dc.subjectChinese remainder theorem
dc.subjectGroup dynamics
dc.subjectGroup key
dc.subjectGroup key management
dc.subjectKey management schemes
dc.subjectMethod claims
dc.subjectSecure group communications
dc.subjectSecure group key management
dc.subjectStrong active outsider adversary
dc.titleProving the (In)Security of CRT Based Key Management Schemes Under SAOA Model

Files

Collections