Provably secure authenticated group Diffie-Hellman key exchange

被引:55
|
作者
Bresson, Emmanuel [1 ]
Chevassut, Olivier [2 ]
Pointcheval, David [3 ]
机构
[1] DCSSI Cryto Lab, F-75700 Paris 07, SP, France
[2] Univ Calif Berkeley, Lawrence Berkeley Lab, Berkeley, CA 94720 USA
[3] Ecole Normale Super, F-75230 Paris 05, France
关键词
algorithms; security; cryptography; Diffie-Hellman; group key exchange;
D O I
10.1145/1266977.1266979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key-exchange protocols allow two participants A and B, communicating over a public network and each holding an authentication means to exchange a shared secret value. Methods designed to deal with this cryptographic problem ensure A (resp. B) that no other participants aside from B (resp. A) can learn any information about the agreed value and often also ensure A and B that their respective partner has actually computed this value. A natural extension to this cryptographic method is to consider a pool of participants exchanging a shared secret value and to provide a formal treatment for it. Starting from the famous two-party Diffie-Hellman (DH) key-exchange protocol and from its authenticated variants, security experts have extended it to the multiparty setting for over a decade and, in the past few years, completed a formal analysis in the framework of modern cryptography. The present paper synthesizes this body of work on the provably-secure authenticated group DH key exchange.
引用
收藏
页数:45
相关论文
共 50 条
  • [41] The optimized Diffie-Hellman key exchange using the graphical method
    Aljader, Huda Kadhim M.
    Ajeena, Ruma Kareem K.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (06): : 1691 - 1697
  • [42] Provably secure length-saving public-key encryption scheme under the computational Diffie-Hellman assumption
    Baek, J
    Lee, B
    Kim, K
    [J]. ETRI JOURNAL, 2000, 22 (04) : 25 - 31
  • [43] The performance of group Diffie-Hellman paradigms
    Hagzan, KS
    Bischof, HP
    [J]. ICWN'04 & PCC'04, VOLS, 1 AND 2, PROCEEDINGS, 2004, : 88 - 94
  • [44] A Provably Secure Authenticated Key Exchange Protocol
    Zhang, Lijiang
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 292 - 297
  • [45] Diffie-Hellman, decision Diffie-Hellman, and discrete logarithms
    Maurer, U
    Wolf, S
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 327 - 327
  • [46] On the bit security of the Diffie-Hellman key
    Blake, IF
    Garefalakis, T
    Shparlinski, IE
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 16 (06) : 397 - 404
  • [47] On the bit security of the Diffie-Hellman key
    Ian F. Blake
    Theo Garefalakis
    Igor E. Shparlinski
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 16 : 397 - 404
  • [48] Implementing Diffie-Hellman Key Exchange using Quantum EPR Pairs
    Mandal, Sayonnha
    Parakh, Abhishek
    [J]. QUANTUM INFORMATION AND COMPUTATION XIII, 2015, 9500
  • [49] EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange on Edwards Curves
    Azarderakhsh, Reza
    Lang, Elena Bakos
    Jao, David
    Koziel, Brian
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2018, 2018, 11348 : 125 - 141
  • [50] Traffic and energy consumption of an IEEE 802.15.4 network in the presence of authenticated, ECC Diffie-Hellman ephemeral key exchange
    Misic, Jelena
    [J]. COMPUTER NETWORKS, 2008, 52 (11) : 2227 - 2236