Securing group key exchange against strong corruptions and key registration attacks (Q1001678)

From MaRDI portal





scientific article; zbMATH DE number 5510722
Language Label Description Also known as
English
Securing group key exchange against strong corruptions and key registration attacks
scientific article; zbMATH DE number 5510722

    Statements

    Securing group key exchange against strong corruptions and key registration attacks (English)
    0 references
    0 references
    0 references
    24 February 2009
    0 references
    Summary: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long-lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task -- the aim of our article. We start by investigating the current setting of strong corruptions and derive some refinements like opening attacks that allow to reveal ephemeral secrets of users without their long-lived keys. This allows to consider even stronger attacks against honest, but `opened' users. Further, we define strong security goals for GKE protocols in the presence of such powerful adversaries and propose a 3-round GKE protocol, named TDH1, which remains immune to their attacks under standard cryptographic assumptions. Our security definitions allow adversaries to register users and specify their long-lived keys, thus, in particular capture attacks of malicious insiders for the appropriate security goals such as Mutual Authentication, key confirmation, contributiveness, key control and key-replication resilience.
    0 references
    authenticated group Key exchange
    0 references
    GKE protocols
    0 references
    contributiveness
    0 references
    insider attacks
    0 references
    Key registration
    0 references
    mutual authentication
    0 references
    strong corruptions
    0 references
    tree Diffie-Hellman
    0 references
    TDH1
    0 references
    security
    0 references
    cryptography
    0 references
    ephemeral secrets
    0 references
    malicious insiders
    0 references
    0 references
    0 references

    Identifiers