Provably secure authenticated group Diffie-Hellman key exchange

被引:55
|
作者
Bresson, Emmanuel [1 ]
Chevassut, Olivier [2 ]
Pointcheval, David [3 ]
机构
[1] DCSSI Cryto Lab, F-75700 Paris 07, SP, France
[2] Univ Calif Berkeley, Lawrence Berkeley Lab, Berkeley, CA 94720 USA
[3] Ecole Normale Super, F-75230 Paris 05, France
关键词
algorithms; security; cryptography; Diffie-Hellman; group key exchange;
D O I
10.1145/1266977.1266979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key-exchange protocols allow two participants A and B, communicating over a public network and each holding an authentication means to exchange a shared secret value. Methods designed to deal with this cryptographic problem ensure A (resp. B) that no other participants aside from B (resp. A) can learn any information about the agreed value and often also ensure A and B that their respective partner has actually computed this value. A natural extension to this cryptographic method is to consider a pool of participants exchanging a shared secret value and to provide a formal treatment for it. Starting from the famous two-party Diffie-Hellman (DH) key-exchange protocol and from its authenticated variants, security experts have extended it to the multiparty setting for over a decade and, in the past few years, completed a formal analysis in the framework of modern cryptography. The present paper synthesizes this body of work on the provably-secure authenticated group DH key exchange.
引用
收藏
页数:45
相关论文
共 50 条
  • [1] Provably secure password-authenticated key exchange using Diffie-Hellman
    Boyko, V
    MacKenzie, P
    Patel, S
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 156 - 171
  • [2] Provably secure authenticated Diffie-Hellman key exchange for resource-limited smart card
    Chien H.-Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2014, 19 (4) : 436 - 439
  • [3] Provably Secure Authenticated Diffie-Hellman Key Exchange for Resource-Limited Smart Card
    简宏宇
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 436 - 439
  • [4] Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange
    Fujioka, Atsushi
    Takashima, Katsuyuki
    Terada, Shintaro
    Yoneyama, Kazuki
    [J]. INFORMATION SECURITY AND CRYPTOLOGY (ICISC 2018), 2019, 11396 : 177 - 195
  • [5] Improving the Diffie-Hellman secure key exchange
    Bhattacharya, P
    Debbabi, M
    Otrok, H
    [J]. 2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, 2005, : 193 - 197
  • [6] Group Diffie-Hellman key exchange secure against dictionary attacks
    Bresson, E
    Chevassut, O
    Pointcheval, D
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 497 - 514
  • [7] A Secure and Efficient Authenticated Diffie-Hellman Protocol
    Sarr, Augustin P.
    Elbaz-Vincent, Philippe
    Bajard, Jean-Claude
    [J]. PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS, 2010, 6391 : 83 - +
  • [8] Authenticated Diffie-Hellman key agreement protocols
    Blake-Wilson, S
    Menezes, A
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 339 - 361
  • [9] Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
    Kim, Minkyu
    Fujioka, Atsushi
    Ustaoglu, Berkant
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2012, E95A (01) : 29 - 39
  • [10] Signed (Group) Diffie-Hellman Key Exchange with Tight Security
    Pan, Jiaxin
    Qian, Chen
    Ringerud, Magnus
    [J]. JOURNAL OF CRYPTOLOGY, 2022, 35 (04)