Skip to main content

Long-Term Secure Asymmetric Group Key Agreement

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SecITC 2021)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13195))

  • 266 Accesses

Abstract

A group key agreement protocol allows a set of users to share a common secret in presence of adversaries. In symmetric group key agreement protocol, the set of users will have a secret key at the end of protocol while in an asymmetric group key agreement protocol, the set of users negotiate a shared encryption and decryption keys, instead of establishing a common secret. Long-term security is a notion of resistance against attacks even if later, after completion of the protocol some security assumptions become invalid. In this paper, we propose a long-term secure one-round asymmetric group key agreement protocol. Our protocol is based on Bilinear Diffie-Hellman assumption and real-or random indistinguishability of the symmetric encryption scheme. For authentication purpose we use a signature scheme and timestamps.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie-Hellman key exchange — the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_18

    Chapter  Google Scholar 

  • Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of the 8th ACM Conference on Computer and Communications Security CCS 2001, pp. 255–264. ACM (2001)

    Google Scholar 

  • Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption (2000). cseweb.ucsd.edu/~mihir/papers/sym-enc.html

  • Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586–615 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  • Barbosa, M., Farshim, P.: Security analysis of standard authentication and key agreement protocols utilising timestamps. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 235–253. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02384-2_15

    Chapter  Google Scholar 

  • Bohli, J.M., üller-Quade, J.M., öhrich, S.R.: Long-term and dynamical aspects of information security: emerging trends in information and communication security, chapter long-term secure key establishment, pp. 87–95. Nova Science Publishers (2007)

    Google Scholar 

  • Bohli, J.M., González Vasco, M.I., Steinwandt, R.: Secure group key establishment revisited. Int. J. Inf. Secur. 6(4), 243–254 (2007)

    Article  Google Scholar 

  • Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_7

    Chapter  Google Scholar 

  • Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    MATH  Google Scholar 

  • Müller-Quade, J., Unruh, D.: Long-term security and universal composability. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 41–60. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_3

    Chapter  Google Scholar 

  • Neupane, K.: One-round authenticated group key establishment using multilinear maps. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds.) FCS 2018. CCIS, vol. 879, pp. 55–65. Springer, Singapore (2018). https://doi.org/10.1007/978-981-13-3095-7_5

    Chapter  Google Scholar 

  • Neupane, K.: Long-term secure deniable group key establishment. In: Maimut, D., Oprina, A.-G., Sauveron, D. (eds.) SecITC 2020. LNCS, vol. 12596, pp. 242–256. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-69255-1_16

    Chapter  Google Scholar 

  • Neupane, K., Steinwandt, R .:Server-assisted long-term secure 3-party key establishment. In: SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, 26–28 July 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 372–378. SciTePress (2010)

    Google Scholar 

  • Neupane, K., Steinwandt, R., Corona, A.S.: Group key establishment: adding perfect forward secrecy at the cost of one round. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 158–168. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35404-5_13

    Chapter  Google Scholar 

  • Unruh, D.: Everlasting multi-party computation. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 380–397. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40084-1_22

    Chapter  Google Scholar 

  • Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_9

    Chapter  Google Scholar 

  • Zhang, Q., Yong Gan, L., Liu, X.W., Luo, X., Li, Y.: An authenticated asymmetric group key agreement based on attribute encryption. J. Netw. Comput. Appl. 123, 1–10 (2018)

    Article  Google Scholar 

  • Zhang, Y., Wang, K., Li, B.: A deniable group key establishment protocol in the standard model. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol. 6047, pp. 308–323. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-12827-1_23

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kashi Neupane .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Neupane, K. (2022). Long-Term Secure Asymmetric Group Key Agreement. In: Ryan, P.Y., Toma, C. (eds) Innovative Security Solutions for Information Technology and Communications. SecITC 2021. Lecture Notes in Computer Science, vol 13195. Springer, Cham. https://doi.org/10.1007/978-3-031-17510-7_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-17510-7_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-17509-1

  • Online ISBN: 978-3-031-17510-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics