Skip to main content

Simple and Efficient Group Key Agreement Based on Factoring

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

Abstract

Group key agreement protocols are designed to allow a group of parties communicating over a public network to agree on a session key in a secure manner. While a number of solutions have been proposed over the years, all of them are inadequate for a group where members are spread across a wide area network; their communication overhead is significant in terms of the number of communication rounds or the number of messages sent, both of which are recognized as the dominant factors that severely slow down the protocols in wide area networks. In this paper we first present a communication-efficient group key agreement protocol and then prove its security against a passive adversary in the random oracle model under the factoring intractability assumption. The proposed protocol provides perfect forward secrecy and runs only in two communication rounds while achieving optimal message complexity. Therefore, the protocol is well suited for networking environments with high communication latency.

This work was supported by the University IT Research Center Project funded by the Korean Ministry of Information and Communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the Performance of Group Key Agreement Protocols. In: Proc. 22nd IEEE International Conference on Distributed Computing Systems, pp. 463–464 (2002), Full version available at http://www.cnds.jhu.edu/publications/

  2. Ateniese, G., Steiner, M., Tsudik, G.: New multiparty authentication services and key agreement protocols. IEEE Journal on Selected Areas in Communications 18(4), 628–639 (2000)

    Article  Google Scholar 

  3. Becker, K., Wille, U.: Communication complexity of group key distribution. In: Proc. 5th ACM Conf. on Computer and Communications Security (CCS 1998), pp. 1–6 (1998)

    Google Scholar 

  4. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. 1st ACM Conf. on Computer and Communications Security (CCS 1993), pp. 62–73 (1993)

    Google Scholar 

  5. Biham, E., Boneh, D., Reingold, O.: Breaking generalized Diffie-Hellman modulo a composite is no easier than factoring. Information Processing Letters (IPL) 70(2), 83–87 (1999)

    Article  MATH  MathSciNet  Google Scholar 

  6. Boyd, C., Nieto, J.M.G.: Round-optimal contributory conference key agreement. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 161–174. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  7. Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie- Hellman key exchange — the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  8. Bresson, E., Chevassut, O., Pointcheval, D.: Dynamic group Diffie-Hellman key exchange under standard assumptions. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 321–336. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  9. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: Proc. 8th ACM Conf. on Computer and Communications Security (CCS 2001), pp. 255–264 (2001)

    Google Scholar 

  10. Burmester, M., Desmedt, Y.: A secure and efficient conference key distribution system. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 275–286. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  11. Ingemarsson, I., Tang, D., Wong, C.: A conference key distribution system. IEEE Trans. on Information Theory 28(5), 714–720 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  12. Just, M., Vaudenay, S.: Authenticated multi-party key agreement. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 36–49. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  13. Kim, Y., Perrig, A., Tsudik, G.: Simple and fault-tolerant key agreement for dynamic collaborative groups. In: Proc. 7th ACM Conf. on Computer and Communications Security (CCS 2000), pp. 235–244 (2000)

    Google Scholar 

  14. Kim, Y., Perrig, A., Tsudik, G.: Communication-efficient group key agreement. In: Proc. of International Federation for Information Processing — 16th International Conference on Information Security (IFIP SEC 2001), June 2001, pp. 229–244 (2001)

    Google Scholar 

  15. Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  16. Steer, D.G., Strawczynski, L., Diffie, W., Wiener, M.: A secure audio teleconference system. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 520–528. Springer, Heidelberg (1990)

    Google Scholar 

  17. Steiner, M., Tsudik, G., Waidner, M.: Key agreement in dynamic peer groups. IEEE Trans. on Parallel and Distributed Systems 11(8), 769–780 (2000)

    Article  Google Scholar 

  18. Tzeng, W.-G., Tzeng, Z.-J.: Round-efficient conference key agreement protocols with provable security. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 614–627. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Nam, J., Cho, S., Kim, S., Won, D. (2004). Simple and Efficient Group Key Agreement Based on Factoring. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_76

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_76

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics