Securing group key exchange against strong corruptions and key registration attacks
Source: International Journal of Applied Cryptography, Volume 1, Number 2, 3 November 2008 , pp. 91-107(17)
Publisher: Inderscience Publishers
Abstract:In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long‐lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task – the aim of our article. We start by investigating the current setting of strong corruptions and derive some refinements like opening attacks that allow to reveal ephemeral secrets of users without their long‐lived keys. This allows to consider even stronger attacks against honest, but 'opened' users. Further, we define strong security goals for GKE protocols in the presence of such powerful adversaries and propose a 3‐round GKE protocol, named TDH1, which remains immune to their attacks under standard cryptographic assumptions. Our security definitions allow adversaries to register users and specify their long‐lived keys, thus, in particular capture attacks of malicious insiders for the appropriate security goals such as Mutual Authentication, key confirmation, contributiveness, key control and key‐replication resilience.
Keywords: Applied and Computational Mathematics; COMPUTING JOURNALS; Communications and Mobile Technology; Computing Science, Applications and Software; Information Systems and Technology; Internet and Web Services
Document Type: Research Article
Publication date: November 3, 2008
- Information security is important to the rapid growth of the Internet and advances of computer systems. However, existing journals on information security mainly focus on either theory or specific areas of information and computer security.
The International Journal of Applied Cryptography aims to introduce new ground between these two areas. It proposes and fosters discussion on cryptographic algorithms and protocols that are directly applicable.
- Information for Authors
- Submit a Paper
- Subscribe to this Title
- Terms & Conditions
- ingentaconnect is not responsible for the content or availability of external websites