Revisiting pairing based group key exchange

被引:0
|
作者
Desmedt, Yvo [1 ]
Lange, Tanja [2 ]
机构
[1] UCL, Dept Comp Sci, BT Chair Informat Secur, London WC1E 6BT, England
[2] Tech Univ Eindhoven, Dept Math & Comp Sci, Eindhoven, Netherlands
来源
基金
英国工程与自然科学研究理事会;
关键词
pairings; key distribution; group key exchange; forward security; authentication;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Secure communication within a large group of users such as participants in a phone or video conference relies on the availability of secure data and efficient data transmission. Group key exchange protocols allow a (large) group of n users to establish a joint secret key which can be used in symmetric systems to efficiently en- and decrypt messages to and from the group. To deal with varying constellations of the groups and to ensure key freshness it is essential that the group key exchange protocol is efficient. Most protocols are generalizations of two-party protocols like Diffie-Hellman key exchange. The Burmester and Desmedt I protocol establishes a key in a constant number of rounds independent of the size of the group of users and in O(n) complexity of computation per user. After Joux's proposal to use pairings to enable a one-round tripartite key exchange (KE) several extensions of existing group KE and authenticated key exchange (AKE) protocols were published. However, quite a few turned out to be flawed and the complexity is often worse than for the original scheme. In this paper we propose a new constant round pairing based group AKE protocol which requires a lower computational complexity per user compared to previous proposals. Furthermore, the scheme is particularly interesting for groups in which some members enjoy more computational power than others. The protocol is most efficient if these members constitute roughly half of the group. We also provide a pairing-based version of the Burmester-Desmedt II group key exchange which runs in 3 rounds and requires only O(log n) computation and communication. Both protocols are faster than any published pairing-based key exchange protocols. If the parameters are chosen appropriately so that the pairing computations are fast the protocols can outperform the respective DL-based Burmester-Desmedt key exchange protocols.
引用
收藏
页码:53 / +
页数:4
相关论文
共 50 条
  • [41] Efficient password-based authenticated group key exchange protocol
    School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
    不详
    Dianzi Keji Diaxue Xuebao, 2009, 3 (393-396+414):
  • [42] Efficient Hybrid Password-Based Authenticated Group Key Exchange
    Wu, Shuhua
    Zhu, Yuefei
    ADVANCES IN DATA AND WEB MANAGEMENT, PROCEEDINGS, 2009, 5446 : 562 - 567
  • [43] An Efficient Improved Group Key Agreement Protocol Based on Diffie-Hellman Key Exchange
    Yang Guang-ming
    Chen Jin-ming
    Lu Ya-feng
    Ma Da-Ming
    2ND IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER CONTROL (ICACC 2010), VOL. 2, 2010, : 303 - 306
  • [44] Infringing key authentication of an ID-Based group key exchange protocol using binary key trees
    Nam, Junghyun
    Paik, Juryon
    Lee, Youngsook
    Kwak, Jin
    Kim, Ung Mo
    Won, Dongho
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS: KES 2007 - WIRN 2007, PT I, PROCEEDINGS, 2007, 4692 : 672 - +
  • [45] An efficient pairing-free identity-based authenticated group key agreement protocol
    Tan, Zuowen
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 534 - 545
  • [46] A Lightweight Certificateless Group Key Agreement Method without Pairing Based on Blockchain for Smart Grid
    Wang, Zhihao
    Huo, Ru
    Wang, Shuo
    FUTURE INTERNET, 2022, 14 (04):
  • [47] Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
    Li, Ming
    Yu, Shucheng
    Lou, Wenjing
    Ren, Kui
    2010 PROCEEDINGS IEEE INFOCOM, 2010,
  • [48] Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios
    Zhang, Jie
    Huang, Xin
    Wang, Wei
    Yue, Yong
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) : 878 - 890
  • [49] Security weakness in a three-party pairing-based protocol for password authenticated key exchange
    Nam, Junghyun
    Lee, Youngsook
    Kim, Seungjoo
    Won, Dongho
    INFORMATION SCIENCES, 2007, 177 (06) : 1364 - 1375
  • [50] Group-Based Key Exchange Protocol Based on Complete Decomposition Search Problem
    Sin, Chang Seng
    Chen, Huey Voon
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 413 - 422