• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

DMCA

GAnGS: Gather Authenticate ’n Group Securely (2008)

Cached

  • Download as a PDF

Download Links

  • [repository.cmu.edu]
  • [www.ece.cmu.edu]
  • [sparrow.ece.cmu.edu]
  • [homes.cs.washington.edu]
  • [www.ece.cmu.edu]
  • [www.iis.sinica.edu.tw]
  • [precision.moscito.org]
  • [by.iis.sinica.edu.tw]
  • [www.cylab.cmu.edu]
  • [www.cylab.cmu.edu]
  • [fuxi.cs.txstate.edu]

  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Chia-hsin Owen Chen , Chung-wei Chen , Cynthia Kuo , Yan-hao Lai , Jonathan M. Mccune , Bo-Yin Yang, Tzong-Chen Wu, et al.
Citations:17 - 4 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@MISC{Chen08gangs:gather,
    author = {Chia-hsin Owen Chen and Chung-wei Chen and Cynthia Kuo and Yan-hao Lai and Jonathan M. Mccune and Bo-Yin Yang and Tzong-Chen Wu and et al.},
    title = {GAnGS: Gather Authenticate ’n Group Securely },
    year = {2008}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Establishing secure communication among a group of physically collocated people is a challenge. This problem can be reduced to establishing authentic public keys among all the participants – these public keys then serve to establish a shared secret symmetric key for encryption and authentication of messages. Unfortunately, in most real-world settings, public key infrastructures (PKI) are uncommon and distributing a secret in a public space is difficult. Thus, it is a challenge to exchange authentic public keys in a scalable, secure, and easy to use fashion. In this paper, we propose GAnGS, a protocol for the secure exchange of authenticated information among a group of people. In contrast to prior work, GAnGS resists Groupin-the-Middle and Sybil attacks by malicious insiders, as well as infiltration attacks by malicious bystanders. GAnGS is designed to be robust to user errors, such as miscounting the number of participants or incorrectly comparing checksums. We have implemented and evaluated GAnGS on Nokia N70 phones. The GAnGS system is viable and achieves a good balance between scalability, security, and ease of use.

Keyphrases

taipei tw    authentic public key    prior work    nokia n70 phone    good balance    malicious insider    shared secret symmetric key    infiltration attack    authenticated information    secure communication    real-world setting    malicious bystander    public key infrastructure    gang system    public key    user error    sybil attack    public space    secure exchange   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University