Skip to main content

A Deniable Group Key Establishment Protocol in the Standard Model

  • Conference paper
Information Security, Practice and Experience (ISPEC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6047))

Abstract

We propose a deniable group key establishment protocol in the standard model. In a deniable group key establishment protocol, the transcript of the protocol session can not be used to prove the involvement of the participant in the protocol session. In other words, the participant can deny that she has joined in the protocol session which she has actually joined in. We figure out that the deniable group key establishment protocol should has the group deniable authentication characteristic, which implies authentication in the protocol execution and deniability after the protocol execution. We give a new definition of the group key establishment deniability in this paper. It is an extension of the definition given by Jens-Matthias Bohli and Rainer Steinwandt. We construct our deniable group key establishment protocol by using a variant of Schnorr’s zero-knowledge identification scheme and Burmester’s group key establishment protocol.

Supported by the National Natural Science Foundation of China (No.60673073 and No.60970153) and the National Basic Research Program of China(973 project) (No.2007CB311201).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdalla, M., Pointcheval, D.: Interactive Diffie-Hellman Assumptions With Applications to Password-Based Authentication. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 341–356. Springer, Heidelberg (2005)

    Google Scholar 

  2. Aiello, W., Bellovin, S.M., Blaze, M., Canetti, M., Ioannidis, J., Keromytis, A.D., Reingold, O.: Just Fast Keying: Key Agreement In A Hostile Internet. ACM Transactions on Information and System Security 7(2), 1–30 (2004)

    Article  Google Scholar 

  3. Bellare, M., Rogaway, P.: Entity Authentication and Key Distribution. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 1440, pp. 232–249. Springer, Heidelberg (1999)

    Google Scholar 

  4. Bellare, M., Rogaway, P.: Provably-Secure Session Key Distribution: the Three Party Case. In: STOC 1995 (1995)

    Google Scholar 

  5. Bellare, M., Canetti, R., Krawczyk, H.: A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. In: STOC 1998 (1998)

    Google Scholar 

  6. Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure Against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139–155. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Bohli, J.-M., Steinwandt, R.: Deniable Group Key Agreement. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 298–311. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  8. Bohli, J.-M.: A framework for robust group key agreement. In: Gavrilova, M.L., Gervasi, O., Kumar, V., Tan, C.J.K., Taniar, D., Laganá, A., Mun, Y., Choo, H. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 355–364. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Boyd, C., Mao, W., Paterson, K.G.: Deniable Authenticated Key Establishment for Internet Protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol. 3364, pp. 255–271. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  10. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably Athenticated Group Diffie-Hellman Key Exchange. In: Proc. of 8th Annual ACM Conference on Computer and Communications Security, pp. 255–264. ACM Press, New York (2001)

    Chapter  Google Scholar 

  11. Bresson, E., Manulis, M., Schwenk, J.: On Security Models and Compilers for Group Key Exchange Protocols. In: Miyaji, A., Kikuchi, H., Rannenberg, K. (eds.) IWSEC 2007. LNCS, vol. 4752, pp. 292–307. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  12. Bresson, E., Manulis, M.: Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of Trust. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 395–409. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  13. Bresson, E., Manulis, M.: Contributory group key exchange in the presence of malicious participants. IET Inf. Sec. 2(3), 85–93 (2008)

    Article  Google Scholar 

  14. Burmester, M., Desmedt, Y.: A Secure and Efficient Conference Key Distribution System. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  15. Canetti, R., Krawczyk, H.: Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 453–474. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  16. Cao, T., Lin, D., Xue, R.: An Efficient ID-Based Deniable Authentication Protocol from Pairings. In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), vol. 1 (AINA papers), pp. 388–391. IEEE, Los Alamitos (2005)

    Google Scholar 

  17. Kaufman, C. (ed.): Internet Key Exchange (IKEv2) Protocol. Network Working Group Request for Comments: 4306 (December 2005), http://www.ietf.org/rfc/rfc4306.txt

  18. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  19. Feige, U., Fiat, A., Shamir, A.: Zero-Knowledge Proofs of Identity. In: Proceeding of STOC 1987, pp. 210–217 (1987); J. Cryptology 1, 77–95 (1988)

    Google Scholar 

  20. Ghodosi, H., Pieprzyk, J.: Multi-Party Computation with Omnipresent Adversary. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 180–195. Springer, Heidelberg (2009)

    Google Scholar 

  21. Goldreich, D.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)

    Book  Google Scholar 

  22. Goyal, V., Mohassel, P., Smith, A.: Efficient Two Party and Multi Party Computation Against Covert Adversaries. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 289–306. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  23. Kanukurthi, B., Reyzin, L.: Key Agreement from Close Secrets over Unsecured Channels. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 206–223. Springer, Heidelberg (2009)

    Google Scholar 

  24. Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. In: 12th ACM Conference on Computer and Communications Security, pp. 180–189. ACM Press, New York (2005)

    Chapter  Google Scholar 

  25. Katz, J., Yung, M.: Scalable Protocols for Authenticated Group Key Exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)

    Google Scholar 

  26. Kim, H.J., Lee, S.U., Lee, D.H.: Constant-Round Authenticated Group Key Exchange for Dynamic Groups. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 245–259. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  27. Krawczyk, H.: SIGMA: The ’SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400–425. Springer, Heidelberg (2003)

    Google Scholar 

  28. Mao, W., Paterson, K.G.: On The Plausible Deniability Feature of Internet Protocols, http://isg.rhul.ac.uk/~kp/IKE.ps

  29. Qian, H., Cao, Z., Wang, L., Xue, Q.: Efficient Noninteractive Deniable Authentication Protocols. In: The Fifth International Conference on Computer and Information Technology (CIT 2005), pp. 673–679. IEEE, Los Alamitos (2005)

    Chapter  Google Scholar 

  30. Safavi-Naini, R., Jiang, S.: Non-interactive conference key distribution and its applications. In: ASIACCS, pp. 271–282. ACM, New York (2008)

    Chapter  Google Scholar 

  31. Schnorr, C.-P.: Efficient Identification and Signatures for Smart Cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, Heidelberg (1990)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Y., Wang, K., Li, B. (2010). A Deniable Group Key Establishment Protocol in the Standard Model. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds) Information Security, Practice and Experience. ISPEC 2010. Lecture Notes in Computer Science, vol 6047. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12827-1_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12827-1_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12826-4

  • Online ISBN: 978-3-642-12827-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics