Securing group key exchange against strong corruptions and key registration attacks. (6th November 2008)
- Record Type:
- Journal Article
- Title:
- Securing group key exchange against strong corruptions and key registration attacks. (6th November 2008)
- Main Title:
- Securing group key exchange against strong corruptions and key registration attacks
- Authors:
- Bresson, Emmanuel
Manulis, Mark - Abstract:
- In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long-lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task – the aim of our article. We start by investigating the current setting of strong corruptions and derive some refinements like opening attacks that allow to reveal ephemeral secrets of users without their long-lived keys. This allows to consider even stronger attacks against honest, but 'opened' users. Further, we define strong security goals for GKE protocols in the presence of such powerful adversaries and propose a 3-round GKE protocol, named TDH1, which remains immune to their attacks under standard cryptographic assumptions. Our security definitions allow adversaries to register users and specify their long-lived keys, thus, in particular capture attacks of malicious insiders for the appropriate security goals such as Mutual Authentication, key confirmation, contributiveness, key control and key-replication resilience.
- Is Part Of:
- International journal of applied cryptography. Volume 1:Number 2(2008)
- Journal:
- International journal of applied cryptography
- Issue:
- Volume 1:Number 2(2008)
- Issue Display:
- Volume 1, Issue 2 (2008)
- Year:
- 2008
- Volume:
- 1
- Issue:
- 2
- Issue Sort Value:
- 2008-0001-0002-0000
- Page Start:
- 91
- Page End:
- 107
- Publication Date:
- 2008-11-06
- Subjects:
- authenticated group key exchange -- GKE protocols -- contributiveness -- insider attacks -- key registration -- mutual authentication -- strong corruptions -- tree Diffie?Hellman -- TDH1 -- security -- cryptography -- ephemeral secrets -- malicious insiders
Data encryption (Computer science) -- Periodicals
Cryptography -- Periodicals
Computer security -- Periodicals
652.8 - Journal URLs:
- http://inderscience.metapress.com/content/121008 ↗
http://www.inderscience.com/ ↗ - Languages:
- English
- ISSNs:
- 1753-0563
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - BLDSS-3PM
British Library STI - ELD Digital store - Ingest File:
- 8109.xml