Contributory group key exchange in the presence of malicious participants
Contributory group key exchange in the presence of malicious participants
- Author(s): E. Bresson and M. Manulis
- DOI: 10.1049/iet-ifs:20070113
For access to this article, please select a purchase option:
Buy article PDF
Buy Knowledge Pack
IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.
Thank you
Your recommendation has been sent to your librarian.
- Author(s): E. Bresson 1 and M. Manulis 2
-
-
View affiliations
-
Affiliations:
1: DCSSI Crypto Lab Paris, France
2: UCL Crypto Group, Université Catholique de Louvain, Belgium
-
Affiliations:
1: DCSSI Crypto Lab Paris, France
- Source:
Volume 2, Issue 3,
September 2008,
p.
85 – 93
DOI: 10.1049/iet-ifs:20070113 , Print ISSN 1751-8709, Online ISSN 1751-8717
In a group key exchange (GKE) protocol, the resulting group key should be computed by all participants such that none of them can gain any advantage concerning the protocol's output: misbehaving participants might have personal advantage in influencing the value of the group key. In fact, the absence of trust relationship is the main feature of GKE (when compared with group key transport) protocols. The existing notions of security are enlarged by identifying limitations in some previously proposed security models while taking into account different types of corruptions (weak and strong). To illustrate these notions, two efficient and provably secure generic solutions, compilers, are presented.
Inspec keywords: cryptographic protocols; transport protocols
Other keywords:
Subjects: Protocols; Cryptography theory; Cryptography
References
-
-
1)
- Bellare, M., Rogaway, P.: `Provably secure session key distribution: the three party case', Proc. 27th Annual ACM Symp. Theory of Computing (STOC'95), 1995, p. 57–66.
-
2)
- A.J. Menezes , P.C. Van Oorschot , S.A. Vanstone . (1997) Handbook of applied cryptography.
-
3)
- Shoup, V.: `On formal models for secure key exchange (Version 4)', RZ 3120, Technical, November 1999, also available at http://shoup.net/.
-
4)
- Günther, C.G.: `An identity-based key-exchange protocol', Advances in Cryptology – EUROCRYPT'89, 1990, p. 29–37, (LNCS, 434).
-
5)
- Yacobi, Y., Shmuely, Z.: `On key distribution systems', Advances in Cryptology – CRYPTO'89, 1990, p. 344–355, (LNCS, 435).
-
6)
- Katz, J., Shin, J.S.: `Modeling insider attacks on group key-exchange protocols', Proc. 12th ACM Conf. Computer and Communications Security (CCS'05), 2005, p. 180–189.
-
7)
- C.J. Mitchell , M. Ward , P. Wilson . Key control in key agreement protocols. Electron. Lett. , 10 , 980 - 981
-
8)
- J.-M. Bohli , M.I.G. Vasco , R. Steinwandt . Secure group key establishment revisited. Int. J. Inf. Secur. , 4 , 243 - 254
-
9)
- Bellare, M., Rogaway, P.: `Entity Authentication and key distribution', Advances in Cryptology – CRYPTO'93, 1993, p. 232–249, (LNCS, 773).
-
10)
- Cleve, R.: `Limits on the security of coin flips when half the processors are faulty', Proc. 18th ACM Symp. Theory of Computing (STOC'86), 1986, p. 364–369.
-
11)
- Bresson, E., Catalano, D.: `Constant round authenticated group key agreement via distributed computation', Proc. of the 7th Int. Workshop on Theory and Practice in Public Key Cryptography (PKC'04), 2004, p. 115–129, (LNCS, 2947).
-
12)
- Kim, Y., Perrig, A., Tsudik, G.: `Simple and fault-tolerant key agreement for dynamic collaborative groups', Proc. 7th ACM Conf. Computer and Communications Security (CCS'00), 2000, p. 235–244.
-
13)
- Desmedt, Y., Pieprzyk, J., Steinfeld, R., Wang, H.: `A non-malleable group key exchange protocol robust against active insiders', Proc. 9th Int. Conf. Information Security (ISC'06), 2006, p. 459–475, (LNCS, 4176).
-
14)
- C. Boyd , A. Mathuria . (2003) Protocols for authentication and key establishment.
-
15)
- Burmester, M., Desmedt, Y.: `A Secure and efficient conference key distribution system', Advances in Cryptology – EUROCRYPT'94, 1994, p. 275–286, (LNCS, 950).
-
16)
- Burmester, M.: `On the risk of opening distributed keys', Advances in Cryptology – CRYPTO'94, 1994, p. 308–317, (LNCS, 839).
-
17)
- Bresson, E., Chevassut, O., Pointcheval, D.: `Dynamic group Diffie-Hellman key exchange under standard assumptions', Advances in Cryptology – EUROCRYPT'02, 2002, p. 321–336, (LNCS, 2332).
-
18)
- S. Goldwasser , S. Micali , R.L. Rivest . A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. , 2 , 281 - 308
-
19)
- Kim, H.-J., Lee, S.-M., Lee, D.H.: `Constant-round authenticated group key exchange for dynamic groups', Advances in Cryptology – ASIACRYPT'04, 2004, p. 245–259, (LNCS, 3329).
-
20)
- Choo, K.-K.R., Boyd, C., Hitchcock, Y.: `Examining indistinguishability-based proof models for key establishment protocols', Advances in Cryptology – ASIACRYPT'05, 2005, p. 585–604, (LNCS, 3788).
-
21)
- Krawczyk, H.: `HMQV: a high-performance secure Diffie-Hellman protocol', Advances in Cryptology – CRYPTO'05, 2005, p. 546–566, (LNCS, 3621).
-
22)
- Ateniese, G., Steiner, M., Tsudik, G.: `Authenticated group key agreement and friends', Proc. 5th ACM Conf. Computer and Communications Security (CCS'98), 1998, p. 17–26.
-
23)
- Manulis, M.: `Survey on security requirements and models for group key exchange', 2006/02, Technical, November 2006, also available at http://eprint.iacr.org/2006/388.
-
24)
- Katz, J., Yung, M.: `Scalable protocols for authenticated group key exchange', Advances in Cryptology – CRYPTO'03, 2003, p. 110–125, (LNCS, 2729).
-
25)
- Manulis, M.: `Security-focused survey on group key exchange protocols', Technical Report 2006/03, November 2006, also available athttp://eprint.iacr.org/2006/395.
-
26)
- W. Diffie , P.C. van Oorschot , M.J. Wiener . Authentication and authenticated key exchanges. Des. Codes Cryptogr. , 2 , 107 - 125
-
27)
- Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: `Provably authenticated group Diffie-Hellman key exchange', Proc. of the 8th ACM Conf. Computer and Communications Security (CCS'01), 2001, p. 255–264.
-
28)
- W. Diffie , M. Hellman . New directions in cryptography. IEEE Trans. Inf. Theory , 6 , 644 - 654
-
1)