Skip to main content

Towards Provably Secure Group Key Agreement Building on Group Theory

  • Conference paper
Progress in Cryptology - VIETCRYPT 2006 (VIETCRYPT 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4341))

Included in the following conference series:

Abstract

Known proposals for key establishment schemes based on combinatorial group theory are often formulated in a rather informal manner. Typically, issues like the choice of a session identifier and parallel protocol executions are not addressed, and no security proof in an established model is provided. Successful attacks against proposed parameter sets for braid groups further decreased the attractivity of combinatorial group theory as a candidate platform for cryptography.

We present a 2-round group key agreement protocol that can be proven secure in the random oracle model if a certain group-theoretical problem is hard. The security proof builds on a framework of Bresson et al., and explicitly addresses some issues concerning malicious insiders and also forward secrecy. While being designed as a tool for basing group key agreement on non-abelian groups, our framework also yields a 2-round group key agreement basing on a Computational Diffie-Hellman assumption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anshel, I., Anshel, M., Fisher, B., Goldfeld, D.: New Key Agreement Protocols in Braid Group Cryptography. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 13–27. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. Anshel, I., Anshel, M., Goldfeld, D.: An Algebraic Method for Public-Key Cryptography. Mathematical Research Letters 6, 287–291 (1999)

    MATH  MathSciNet  Google Scholar 

  3. Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: Proceedings of the 30th Annual ACM Symposium on Theory of Computing STOC, pp. 319–428 (1998)

    Google Scholar 

  4. Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Bellare, M., Rogaway, P.: Entitiy Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 232–249. Springer, Heidelberg (1994)

    Google Scholar 

  6. Bohli, J.-M.: A Framework for Robust Group Key Agreement. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 355–364. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  7. Bohli, J.-M., Vasco, M.I.G., Steinwandt, R.: Secure Group Key Establishment Revisited. Cryptology ePrint Archive, Report 2005/395 (2005), http://eprint.iacr.org/2005/395/

  8. Boneh, D., Silverberg, A.: Applications of Multilinear Forms to Cryptography. Contemporary Mathematics 324, 71–90 (2003)

    MathSciNet  Google Scholar 

  9. Boyd, C., Nieto, J.M.G.: Round-Optimal Contributory Conference Key Agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  10. Boyd, C., Mathuria, A.: Protocols for Authentication and Key Establishment. Information Security and Cryptography; Texts and Monographs. Springer, Heidelberg (2003)

    Google Scholar 

  11. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably Authenticated Group Diffie-Hellman Key Exchange. In: Samarati, P. (ed.) Proceedings of the 8th ACM Conference on Computer and Communications Security, pp. 255–264. ACM Press, New York (2001)

    Chapter  Google Scholar 

  12. Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  13. Catalano, D., Pointcheval, D., Pornin, T.: IPAKE: Isomorphisms for Password-based Authenticated Key Exchange. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 477–493. Springer, Heidelberg (2004)

    Google Scholar 

  14. Cheon, J.H., Jun, B.: A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 212–225. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  15. Dehornoy, P.: Braid-based cryptography. In: Myasnikov, A.G. (ed.) Group Theory, Statistics, and Cryptography. Contemporary Mathematics, vol. 360, pp. 5–33. ACM, New York (2004), Online available at: http://www.math.unicaen.fr/~dehornoy/Surveys/Dgw.ps

    Google Scholar 

  16. Gerber, D., Kaplan, S., Teicher, M., Tsaban, B., Vishne, U.: Probabilistic solutions of equations in the braid group. Advances in Applied Mathematics 35(3), 323–334 (2005)

    Article  MathSciNet  Google Scholar 

  17. Vasco, M.I.G., Martínez, C., Steinwandt, R., Villar, J.L.: A new Cramer-Shoup like methodology for group based provably secure schemes. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 495–509. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  18. Grigoriev, D., Ponomarenko, I.: Constructions in public-key cryptography over matrix groups. arXiv preprint (2005), Online available at: http://arxiv.org/abs/math.GR/0506180

  19. Hofheinz, D., Steinwandt, R.: A Practical Attack on Some Braid Group Based Cryptographic Primitives. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 187–198. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  20. Katz, J., Shin, J.S.: Modeling Insider Attacks on Group Key-Exchange Protocols. In: 12th ACM Conference on Computer and Communications Security, pp. 180–189. ACM Press, New York (2005)

    Chapter  Google Scholar 

  21. Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  22. Ko, K.H., Lee, S.J., Cheon, J.H., Han, J.W., Kang, J.: New Public-Key Cryptosystem Using Braid Groups. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 166–183. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  23. Lee, H.-K., Lee, H.-S., Lee, Y.-R.: Cryptology ePrint Archive: Report 2003/018 (2003), http://eprint.iacr.org/2003/018

  24. Shoup, V.: On Formal Models for Secure Key Exchange (version 4). Revision of IBM Research Report RZ 3120 (April 1999) (November 1999), Online available at: http://www.shoup.net/papers/skey.pdf

  25. Shpilrain, V., Ushakov, A.: A new key exchange protocol based on the decomposition problem. Cryptology ePrint Archive: Report 2005/447 (2005), http://eprint.iacr.org/2005/447

  26. Shpilrain, V., Ushakov, A.: Thompson’s Group and Public Key Cryptography. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 151–163. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  27. Shpilrain, V., Ushakov, A.: The conjugacy search problem in public key cryptography: unnecessary and insufficient. Applicable Algebra in Engineering, Communication and Computing (to appear), Online available at: http://www.sci.ccny.cuny.edu/~shpil/csp.pdf

  28. Shpilrain, V., Zapata, G.: Combinatorial group theory and public key cryptography. Applicable Algebra in Engineering, Communication and Computing (to appear), Online available at: http://www.sci.ccny.cuny.edu/~shpil/pkc.pdf

  29. Smart, N.: Efficient Key Encapsulation to Multiple Parties. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 208–219. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bohli, JM., Glas, B., Steinwandt, R. (2006). Towards Provably Secure Group Key Agreement Building on Group Theory. In: Nguyen, P.Q. (eds) Progress in Cryptology - VIETCRYPT 2006. VIETCRYPT 2006. Lecture Notes in Computer Science, vol 4341. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11958239_22

Download citation

  • DOI: https://doi.org/10.1007/11958239_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-68799-3

  • Online ISBN: 978-3-540-68800-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics