Provably secure authenticated group Diffie-Hellman key exchange

被引:59
作者
Bresson, Emmanuel [1 ]
Chevassut, Olivier [2 ]
Pointcheval, David [3 ]
机构
[1] DCSSI Cryto Lab, F-75700 Paris 07, SP, France
[2] Univ Calif Berkeley, Lawrence Berkeley Lab, Berkeley, CA 94720 USA
[3] Ecole Normale Super, F-75230 Paris 05, France
关键词
algorithms; security; cryptography; Diffie-Hellman; group key exchange;
D O I
10.1145/1266977.1266979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key-exchange protocols allow two participants A and B, communicating over a public network and each holding an authentication means to exchange a shared secret value. Methods designed to deal with this cryptographic problem ensure A (resp. B) that no other participants aside from B (resp. A) can learn any information about the agreed value and often also ensure A and B that their respective partner has actually computed this value. A natural extension to this cryptographic method is to consider a pool of participants exchanging a shared secret value and to provide a formal treatment for it. Starting from the famous two-party Diffie-Hellman (DH) key-exchange protocol and from its authenticated variants, security experts have extended it to the multiparty setting for over a decade and, in the past few years, completed a formal analysis in the framework of modern cryptography. The present paper synthesizes this body of work on the provably-secure authenticated group DH key exchange.
引用
收藏
页数:45
相关论文
共 73 条
[1]   An integrated solution for secure group communication in wide-area networks [J].
Agarwal, DA ;
Chevassutt, O ;
Thompson, MR ;
Tsudik, G .
PROCEEDINGS OF THE SIXTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, 2001, :22-28
[2]   Secure group communication using robust contributory key agreement [J].
Amir, Y ;
Kim, Y ;
Nita-Rotaru, C ;
Schultz, JL ;
Stanton, J ;
Tsudik, G .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2004, 15 (05) :468-480
[3]  
AMIR Y, 1998, CNDS984
[4]  
[Anonymous], LNCS
[5]  
[Anonymous], 2003, INF SECUR CRYTOGR
[6]  
[Anonymous], 2004, GRID 2 BLUEPRINT NEW
[7]  
[Anonymous], 1998, P 30 ANN ACM S THEOR
[8]  
[Anonymous], P 5 ACM C COMP COMM
[9]  
Ateniese G., 1998, 5th ACM Conference on Computer and Communications Security, P17, DOI 10.1145/288090.288097
[10]   New multiparty authentication services and key agreement protocols [J].
Ateniese, G ;
Steiner, M ;
Tsudik, G .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2000, 18 (04) :628-639