Computationally-Fair group and identity-based key-exchange

作者: Andrew C Yao , Yunlei Zhao , None

DOI: 10.1007/978-3-642-29952-0_26

关键词: MathematicsRandom oracleComputer security modelSecrecyComputational complexity theoryKey exchangeAdversaryProtocol (science)Computer securityHash function

摘要: In this work, we re-examine some fundamental group key-exchange and identity-based protocols, specifically the Burmester-Desmedet protocol [7] (referred to as BD-protocol) Chen-Kudla [9] CK-protocol). We identify new attacks on these showing in particular that protocols are not computationally fair. Specifically, with our attacks, an adversary can do following damages: It compute session-key output much lesser computational complexity than of victim honest player, maliciously nullify contributions from players. It set be pre-determined value, which efficiently publicly computed without knowing any secrecy supposed held by attacker. We remark beyond traditional security models for key-exchange, yet bring perspectives literature key-exchange. then present fixing approaches, prove fixed

参考文章(24)
Mike Burmester, Yvo Desmedt, A secure and efficient conference key distribution system theory and application of cryptographic techniques. pp. 275- 286 ,(1994) , 10.1007/BFB0053443
M. Choudary Gorantla, Raju Gangishetti, Ashutosh Saxena, A Survey on ID-Based Cryptographic Primitives. IACR Cryptology ePrint Archive. ,vol. 2005, pp. 94- ,(2005)
Shafi Goldwasser, Yehuda Lindell, Secure Computation without Agreement Lecture Notes in Computer Science. pp. 17- 32 ,(2002) , 10.1007/3-540-36108-1_2
L. Chen, C. Kudla, Identity based authenticated key agreement protocols from pairings ieee computer security foundations symposium. pp. 219- 233 ,(2003) , 10.1109/CSFW.2003.1212715
Yvo Desmedt, Josef Pieprzyk, Ron Steinfeld, Huaxiong Wang, A Non-malleable Group Key Exchange Protocol Robust Against Active Insiders Lecture Notes in Computer Science. pp. 459- 475 ,(2006) , 10.1007/11836810_33
Sattam S. Al-Riyami, Kenneth G. Paterson, Certificateless Public Key Cryptography international conference on the theory and application of cryptology and information security. pp. 452- 473 ,(2003) , 10.1007/978-3-540-40061-5_29
Andrew C. Yao, Yunlei Zhao, A New Family of Practical Non-Malleable Diffie-Hellman Protocols arXiv: Cryptography and Security. ,(2011)
Alfred J Menezes, Paul C van Oorschot, Scott A Vanstone, Handbook of Applied Cryptography ,(1996)
Jonathan Katz, Moti Yung, Scalable Protocols for Authenticated Group Key Exchange Advances in Cryptology - CRYPTO 2003. pp. 110- 125 ,(2003) , 10.1007/978-3-540-45146-4_7
C.J. Mitchell, M. Ward, P. Wilson, Key control in key agreement protocols Electronics Letters. ,vol. 34, pp. 980- 981 ,(1998) , 10.1049/EL:19980686