Provably secure authenticated group Diffie-Hellman key exchange

被引:59
作者
Bresson, Emmanuel [1 ]
Chevassut, Olivier [2 ]
Pointcheval, David [3 ]
机构
[1] DCSSI Cryto Lab, F-75700 Paris 07, SP, France
[2] Univ Calif Berkeley, Lawrence Berkeley Lab, Berkeley, CA 94720 USA
[3] Ecole Normale Super, F-75230 Paris 05, France
关键词
algorithms; security; cryptography; Diffie-Hellman; group key exchange;
D O I
10.1145/1266977.1266979
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated key-exchange protocols allow two participants A and B, communicating over a public network and each holding an authentication means to exchange a shared secret value. Methods designed to deal with this cryptographic problem ensure A (resp. B) that no other participants aside from B (resp. A) can learn any information about the agreed value and often also ensure A and B that their respective partner has actually computed this value. A natural extension to this cryptographic method is to consider a pool of participants exchanging a shared secret value and to provide a formal treatment for it. Starting from the famous two-party Diffie-Hellman (DH) key-exchange protocol and from its authenticated variants, security experts have extended it to the multiparty setting for over a decade and, in the past few years, completed a formal analysis in the framework of modern cryptography. The present paper synthesizes this body of work on the provably-secure authenticated group DH key exchange.
引用
收藏
页数:45
相关论文
共 73 条
[11]   Reliable broadcast in a computational hybrid model with byzantine faults, crashes, and recoveries [J].
Backes, M ;
Cachin, C .
2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, :37-46
[12]  
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[13]   Pseudorandom functions revisited: The cascade construction and its concrete security [J].
Bellare, M ;
Canetti, R ;
Krawczyk, H .
37TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1996, :514-523
[14]  
Bellare M., 1995, Proceedings of the Twenty-Seventh Annual ACM Symposium on the Theory of Computing, P57, DOI 10.1145/225058.225084
[15]  
Bellare M, 1994, LECT NOTES COMPUTER, V773, P232, DOI DOI 10.1007/3-540-48329-2
[16]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[17]   A practical approach to the InterGroup protocols [J].
Berket, K ;
Agarwal, DA ;
Chevassut, O .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2002, 18 (05) :709-719
[18]  
Berman F., 2003, GRID COMPUTING MAKIN
[19]  
BIRD R, 1992, LECT NOTES COMPUT SC, V576, P44
[20]  
BIRMAN KP, 1999, SOFTWARE PRACT EXPER, V29, P9