Revisiting pairing based group key exchange

被引:0
|
作者
Desmedt, Yvo [1 ]
Lange, Tanja [2 ]
机构
[1] UCL, Dept Comp Sci, BT Chair Informat Secur, London WC1E 6BT, England
[2] Tech Univ Eindhoven, Dept Math & Comp Sci, Eindhoven, Netherlands
来源
基金
英国工程与自然科学研究理事会;
关键词
pairings; key distribution; group key exchange; forward security; authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure communication within a large group of users such as participants in a phone or video conference relies on the availability of secure data and efficient data transmission. Group key exchange protocols allow a (large) group of n users to establish a joint secret key which can be used in symmetric systems to efficiently en- and decrypt messages to and from the group. To deal with varying constellations of the groups and to ensure key freshness it is essential that the group key exchange protocol is efficient. Most protocols are generalizations of two-party protocols like Diffie-Hellman key exchange. The Burmester and Desmedt I protocol establishes a key in a constant number of rounds independent of the size of the group of users and in O(n) complexity of computation per user. After Joux's proposal to use pairings to enable a one-round tripartite key exchange (KE) several extensions of existing group KE and authenticated key exchange (AKE) protocols were published. However, quite a few turned out to be flawed and the complexity is often worse than for the original scheme. In this paper we propose a new constant round pairing based group AKE protocol which requires a lower computational complexity per user compared to previous proposals. Furthermore, the scheme is particularly interesting for groups in which some members enjoy more computational power than others. The protocol is most efficient if these members constitute roughly half of the group. We also provide a pairing-based version of the Burmester-Desmedt II group key exchange which runs in 3 rounds and requires only O(log n) computation and communication. Both protocols are faster than any published pairing-based key exchange protocols. If the parameters are chosen appropriately so that the pairing computations are fast the protocols can outperform the respective DL-based Burmester-Desmedt key exchange protocols.
引用
收藏
页码:53 / +
页数:4
相关论文
共 50 条
  • [1] Password authenticated group key exchange protocol based on Weil pairing
    Li, Guo-Jing
    Su, Xiao-Xi
    Wen, Tao
    Shenyang Gongye Daxue Xuebao/Journal of Shenyang University of Technology, 2011, 33 (03): : 299 - 302
  • [2] Hierarchical group password-authenticated key exchange based on bilinear pairing
    Liu, Xiu-Mei
    Gao, Ke-Ning
    Chang, Gui-Ran
    Tongxin Xuebao/Journal on Communications, 2010, 31 (06): : 44 - 48
  • [3] Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments
    Desmedt, Yvo
    Miyaji, Atsuko
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 236 - +
  • [4] Identity Based Group Key Agreement from Bilinear Pairing
    WANG Liming~ 1
    2. Graduate University of Chinese Academy of Sciences
    Wuhan University Journal of Natural Sciences, 2006, (06) : 1731 - 1735
  • [5] Pairing based cryptography New random point exchange key protocol
    Assoujaa, Ismail
    Ezzouak, Siham
    Mouanis, Hakima
    2022 7TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND INDUSTRY, MCSI, 2022, : 61 - 65
  • [6] An identity-based group key agreement protocol from pairing
    Wang, Hongji
    Yao, Gang
    Jiang, Qingshan
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 532 - +
  • [7] Strongly Secure Identity-Based Key Exchange with Single Pairing Operation
    Tomida, Junichi
    Fujioka, Atsushi
    Nagai, Akira
    Suzuki, Koutarou
    COMPUTER SECURITY - ESORICS 2019, PT II, 2019, 11736 : 484 - 503
  • [8] Strongly Secure Identity-Based Key Exchange with Single Pairing Operation
    Tomida, Junichi
    Fujioka, Atsushi
    Nagai, Akira
    Suzuki, Koutarou
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 58 - 68
  • [9] Identity-based Authenticated Key Exchange Protocols from the Tate Pairing
    Shen, Jun
    Jin, Hong
    Yang, Zhiyong
    Cui, Xiang
    FOURTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2011): COMPUTER VISION AND IMAGE ANALYSIS: PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2012, 8350
  • [10] Efficient password-based group key exchange
    Lee, SM
    Hwang, JY
    Lee, DH
    TRUST AND PRIVACY IN DIGITAL BUSINESS, PROCEEDINGS, 2004, 3184 : 191 - 199