Scalable Protocols for Authenticated Group Key Exchange
2003, Lecture Notes in Computer Science
https://doi.org/10.1007/978-3-540-45146-4_7Abstract
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have been proposed; however, all provably-secure solutions thus far are not scalable and, in particular, require n rounds. Our main contribution is the first scalable protocol for this problem along with a rigorous proof of security in the standard model under the DDH assumption; our protocol uses a constant number of rounds and requires only O(1) modular exponentiations per user (for key derivation). Toward this goal and of independent interest, we first present a scalable compiler that transforms any group key-exchange protocol secure against a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls all communication in the network. This compiler adds only one round and O(1) communication (per user) to the original scheme. We then prove secure -against a passive adversary -a variant of the tworound group key-exchange protocol of Burmester and Desmedt. Applying our compiler to this protocol results in a provably-secure three-round protocol for authenticated group key exchange which also achieves forward secrecy.
References (33)
- S.S. Al-Riyami and K.G. Paterson. Tripartite Authenticated Key Agreement Pro- tocols from Pairings. Available at http://eprint.iacr.org/2002/035/.
- G. Ateniese, M. Steiner, and G. Tsudik. Authenticated Group Key Agreement and Friends. ACM CCCS '98.
- G. Ateniese, M. Steiner, and G. Tsudik. New Multi-Party Authentication Services and Key Agreement Protocols. IEEE Journal on Selected Areas in Communica- tions, 18(4): 628-639 (2000).
- M. Bellare, R. Canetti, and H. Krawczyk. A Modular Approach to the Design and Analysis of Authentication and Key Exchange Protocols. STOC '98.
- M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated Key Exchange Secure Against Dictionary Attacks. Eurocrypt 2000.
- M. Bellare and P. Rogaway. Entity Authentication and Key Distribution. Crypto '93.
- M. Bellare and P. Rogaway. Provably-Secure Session Key Distribution: the Three Party Case. STOC '95.
- R. Bird, I. Gopal, A. Herzberg, P. Janson, S. Kutten, R. Molva, and M. Yung. Systematic Design of Two-Party Authentication Protocols. IEEE J. on Selected Areas in Communications, 11(5): 679-693 (1993). A preliminary version appeared in Crypto '91.
- C. Boyd. On Key Agreement and Conference Key Agreement. ACISP '97.
- C. Boyd and J.M.G. Nieto. Round-Optimal Contributory Conference Key Agree- ment. PKC 2003.
- E. Bresson, O. Chevassut, and D. Pointcheval. Provably Authenticated Group Diffie-Hellman Key Exchange -The Dynamic Case. Asiacrypt 2001.
- E. Bresson, O. Chevassut, and D. Pointcheval. Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions. Eurocrypt 2002.
- E. Bresson, O. Chevassut, D. Pointcheval, and J.-J. Quisquater. Provably Authen- ticated Group Diffie-Hellman Key Exchange. ACM CCCS 2001.
- M. Burmester and Y. Desmedt. A Secure and Efficient Conference Key Distribution System. Eurocrypt '94.
- R. Canetti and H. Krawczyk. Key-Exchange Protocols and Their Use for Building Secure Channels. Eurocrypt 2001.
- R. Canetti and H. Krawczyk. Universally Composable Notions of Key Exchange and Secure Channels. Eurocrypt 2002.
- R. Canetti and H. Krawczyk. Security Analysis of IKE's Signature-Based Key- Exchange Protocol. Crypto 2002.
- Y. Desmedt. Personal communication (including a copy of the pre-proceedings version of [14]), March 2003.
- W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory, 22(6): 644-654 (1976).
- W. Diffie, P. van Oorschot, and M. Wiener. Authentication and Authenticated Key Exchanges. Designs, Codes, and Cryptography, 2(2): 107-125 (1992).
- M. Fischer, N. Lynch, and M. Patterson. Impossibility of Distributed Consensus with One Faulty Process. J. ACM 32(2): 374-382 (1985).
- I. Ingemarsson, D.T. Tang, and C.K. Wong. A Conference Key Distribution Sys- tem. IEEE Transactions on Information Theory, 28(5): 714-720 (1982).
- A. Joux. A One Round Protocol for Tripartite Diffie Hellman. ANTS 2000.
- M. Just and S. Vaudenay. Authenticated Multi-Party Key Agreement. Asiacrypt '96.
- H. Krawczyk. SKEME: A Versatile Secure Key-Exchange Mechanism for the In- ternet. Proceedings of the Internet Society Symposium on Network and Distributed System Security, Feb. 1996, pp. 114-127.
- H.-K. Lee, H.-S. Lee, and Y.-R. Lee. Multi-Party Authenticated Key Agreement Protocols from Multilinear Forms. Available at http://eprint.iacr.org/2002/166/.
- H.-K. Lee, H.-S. Lee, and Y.-R. Lee. An Authenticated Group Key Agreement Protocol on Braid groups. Available at http://eprint.iacr.org/2003/018/.
- A. Mayer and M. Yung. Secure Protocol Transformation via "Expansion": From Two-Party to Groups. ACM CCCS '99.
- O. Pereira and J.-J. Quisquater. A Security Analysis of the Cliques Protocol Suites. IEEE Computer Security Foundations Workshop, June 2001.
- V. Shoup. On Formal Models for Secure Key Exchange. Draft, 1999. Available at http://eprint.iacr.org/1999/012.
- M. Steiner, G. Tsudik, and M. Waidner. Key Agreement in Dynamic Peer Groups. IEEE Trans. on Parallel and Distributed Systems 11(8): 769-780 (2000). A pre- liminary version appeared in ACM CCCS '96.
- W.-G. Tzeng. A Practical and Secure Fault-Tolerant Conference Key Agreement Protocol. PKC 2000.
- W.-G. Tzeng and Z.-J. Tzeng. Round Efficient Conference Key Agreement Proto- cols with Provable Security. Asiacrypt 2000.