Securing group key exchange against strong corruptions and key registration attacks (Q1001678)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Securing group key exchange against strong corruptions and key registration attacks |
scientific article; zbMATH DE number 5510722
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Securing group key exchange against strong corruptions and key registration attacks |
scientific article; zbMATH DE number 5510722 |
Statements
Securing group key exchange against strong corruptions and key registration attacks (English)
0 references
24 February 2009
0 references
Summary: In Group Key Exchange (GKE) protocols, users usually extract the group key using some auxiliary (ephemeral) secret information generated during the execution. Strong corruptions are attacks by which an adversary can reveal these ephemeral secrets, in addition to the possibly used long-lived keys. Undoubtedly, security impact of strong corruptions is serious, and thus specifying appropriate security requirements and designing secure GKE protocols appears an interesting yet challenging task -- the aim of our article. We start by investigating the current setting of strong corruptions and derive some refinements like opening attacks that allow to reveal ephemeral secrets of users without their long-lived keys. This allows to consider even stronger attacks against honest, but `opened' users. Further, we define strong security goals for GKE protocols in the presence of such powerful adversaries and propose a 3-round GKE protocol, named TDH1, which remains immune to their attacks under standard cryptographic assumptions. Our security definitions allow adversaries to register users and specify their long-lived keys, thus, in particular capture attacks of malicious insiders for the appropriate security goals such as Mutual Authentication, key confirmation, contributiveness, key control and key-replication resilience.
0 references
authenticated group Key exchange
0 references
GKE protocols
0 references
contributiveness
0 references
insider attacks
0 references
Key registration
0 references
mutual authentication
0 references
strong corruptions
0 references
tree Diffie-Hellman
0 references
TDH1
0 references
security
0 references
cryptography
0 references
ephemeral secrets
0 references
malicious insiders
0 references