Scalable Protocols for Authenticated Group Key Exchange

被引:0
|
作者
Jonathan Katz
Moti Yung
机构
[1] Department of Computer Science,
[2] University of Maryland,undefined
[3] RSA Laboratories and Department of Computer Science,undefined
[4] Columbia University,undefined
来源
Journal of Cryptology | 2007年 / 20卷
关键词
Random Oracle; Random Oracle Model; Forward Secrecy; Modular Exponentiation; Test Query;
D O I
暂无
中图分类号
学科分类号
摘要
We consider the problem of authenticated group key exchange among n parties communicating over an insecure public network. A number of solutions to this problem have been proposed; however, all prior provably secure solutions do not scale well and, in particular, require O(n) rounds. Our main contribution is the first scalable protocol for this problem along with a rigorous proof of security in the standard model under the DDH assumption; our protocol uses a constant number of rounds and requires only O(1) "full" modular exponentiations per user. Toward this goal (and adapting work of Bellare, Canetti, and Krawczyk), we first present an efficient compiler that transforms any group key-exchange protocol secure against a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls all communication in the network. This compiler adds only one round and O(1) communication (per user) to the original scheme. We then prove secure—against a passive adversary—a variant of the two-round group key-exchange protocol of Burmester and Desmedt. Applying our compiler to this protocol results in a provably secure three-round protocol for authenticated group key exchange which also achieves forward secrecy.
引用
收藏
页码:85 / 113
页数:28
相关论文
共 50 条
  • [1] Scalable protocols for authenticated group key exchange
    Katz, Jonathan
    Yung, Moti
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (01) : 85 - 113
  • [2] Scalable protocols for authenticated group key exchange
    Katz, J
    Yung, M
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 110 - 125
  • [3] SAS-GKE: A Secure Authenticated Scalable Group Key Exchange
    Faisal, Abu
    Zulkernine, Mohammad
    [J]. 2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS, 2022, : 571 - 582
  • [4] Modelling Time for Authenticated Key Exchange Protocols
    Schwenk, Joerg
    [J]. COMPUTER SECURITY - ESORICS 2014, PT II, 2014, 8713 : 277 - 294
  • [5] Analysis of Two Authenticated Key Exchange Protocols
    Cheng, Qingfeng
    Hang, Guangguo
    Ma, Chuangui
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 398 - +
  • [6] ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS
    Bala, Suman
    Sharma, Gaurav
    Bansal, Himani
    Bhatia, Tarunpreet
    [J]. SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2019, 20 (01): : 93 - 99
  • [7] Scalable authenticated tree based group key exchange for ad-hoc groups
    Desmedt, Yvo
    Lange, Tanja
    Burmester, Mike
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2007, 4886 : 104 - +
  • [8] Authenticated Key Exchange Protocols Based on Factoring Assumption
    Huang, Hai
    [J]. PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 21 - 37
  • [9] Certificateless and Identity based Authenticated Key Exchange Protocols
    Badrinarayanan, Saikrishna
    Rangan, C. Pandu
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 255 - 277
  • [10] Resource-aware protocols for authenticated group key exchange in integrated wired and wireless networks
    Nam, Junghyun
    Paik, Juryon
    Kim, Ung Mo
    Won, Dongho
    [J]. INFORMATION SCIENCES, 2007, 177 (23) : 5441 - 5467