Skip to main content

Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7868))

Abstract

A group key exchange (GKE) protocol enables users to set up a common secret key to be used later. There are three major security definitions regarding GKE: authenticated key exchange (AKE-security), mutual authentication (MA-security) and contributiveness. In this paper, we propose a stronger model in which both internal state and ephemeral key leakage is considered in different exposure levels. On the other hand, we demonstrate the previous definition on contributiveness is weak, and cannot provide necessary security guarantees. As a solution, we give a stronger definition for contributiveness that is suitable in most interesting cases. We then present an efficient GKE protocol secure in our stronger model. Finally, as an independent interest, we revisit the security of a previous GKE protocol (BGS + ), showing it fails to provide the desirable security requirement defined in its own model.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ateniese, G., Steiner, M., Tsudik, G.: Authenticated group key agreement and friends. In: CCS 1998, pp. 17–26. ACM (1998)

    Google Scholar 

  2. Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  3. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.J.: Provably authenticated group Diffie-Hellman key exchange. In: CCS 2001, pp. 255–264. ACM (2001)

    Google Scholar 

  4. Bresson, E., Manulis, M.: Malicious participants in group key exchange: Key control and contributiveness in the shadow of trust. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds.) ATC 2007. LNCS, vol. 4610, pp. 395–409. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Bresson, E., Manulis, M.: Securing group key exchange against strong corruptions. In: ASIACCS 2008, pp. 249–260. ACM (2008)

    Google Scholar 

  6. Bohli, J.M., Gonzalez Vasco, M.I., Steinwandt, R.: Secure group key establishment revisited. International Journal of Information Security 6(4), 243–254 (2007)

    Article  Google Scholar 

  7. Cremers, C.J.F.: session-state reveal is stronger than ephemeral key reveal: Attacking the NAXOS authenticated key exchange protocol. In: Abdalla, M., Pointcheval, D., Fouque, P.-A., Vergnaud, D. (eds.) ACNS 2009. LNCS, vol. 5536, pp. 20–33. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  8. Desmedt, Y., Pieprzyk, J., Steinfeld, R., Wang, H.: A non-malleable group key exchange protocol robust against active insiders. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 459–475. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  9. Gorantla, M.C., Boyd, C., González Nieto, J.M.: Modeling key compromise impersonation attacks on group key exchange protocols. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 105–123. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  10. Gorantla, M.C., Boyd, C., Gonzalez-Nieto, J.M.: Universally composable contributory group key exchange. In: ASIACCS 2009, pp. 146–156. ACM (2009)

    Google Scholar 

  11. Kim, H.-J., Lee, S.-M., Lee, D.H.: Constant-round authenticated group key exchange for dynamic groups. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 245–259. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  12. Katz, J., Shin, J.S.: Modeling insider attacks on group key-exchange protocols. In: CCS 2005, pp. 180–189. ACM (2005)

    Google Scholar 

  13. Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  14. LaMacchia, B., Lauter, K., Mityagin, A.: Stronger security of authenticated key exchange. In: Susilo, W., Liu, J.K., Mu, Y. (eds.) ProvSec 2007. LNCS, vol. 4784, pp. 1–16. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  15. Manulis, M., Suzuki, K., Ustaoglu, B.: Modeling leakage of ephemeral secrets in tripartite/group Key exchange. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 16–33. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  16. Menezes, A., Ustaoglu, B.: Comparing the pre- and post-specified peer models for key agreement. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 53–68. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  17. Mitchell, C.J., Ward, M., Wilson, P.: Key control in key agreement protocols. Electronic Letters 34(10), 980–981 (1998)

    Article  Google Scholar 

  18. Pieprzyk, J., Wang, H.: Key control in multi-party key agreement protocols. In: CCC 2003. PCS, vol. 23, pp. 277–288 (2003)

    Google Scholar 

  19. Ustaoglu, B.: Comparing SessionStateReveal and EphemeralKeyReveal for Diffie-Hellman Protocols. In: Pieprzyk, J., Zhang, F. (eds.) ProvSec 2009. LNCS, vol. 5848, pp. 183–197. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  20. Zhao, J.J., Gu, D.W., Gorantla, M.C.: Stronger security model of group key agreement. In: ASIACCS 2011, pp. 435–440. ACM (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chen, C., Guo, Y., Zhang, R. (2013). Group Key Exchange Resilient to Leakage of Ephemeral Secret Keys with Strong Contributiveness. In: De Capitani di Vimercati, S., Mitchell, C. (eds) Public Key Infrastructures, Services and Applications. EuroPKI 2012. Lecture Notes in Computer Science, vol 7868. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40012-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40012-4_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40011-7

  • Online ISBN: 978-3-642-40012-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics