Sciweavers

CRYPTO
2003
Springer

Scalable Protocols for Authenticated Group Key Exchange

13 years 10 months ago
Scalable Protocols for Authenticated Group Key Exchange
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have been proposed; however, all provably-secure solutions thus far are not scalable and, in particular, require O(n) rounds. Our main contribution is the first scalable protocol for this problem along with a rigorous proof of security in the standard model under the DDH assumption; our protocol uses a constant number of rounds and requires only O(1) “full” modular exponentiations per user. Toward this goal and of independent interest, we first present a scalable compiler that transforms any group key-exchange protocol secure against a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls all communication in the network. This compiler adds only one round and O(1) communication (per user) to the original scheme. We then prove secure — against a passive adve...
Jonathan Katz, Moti Yung
Added 06 Jul 2010
Updated 06 Jul 2010
Type Conference
Year 2003
Where CRYPTO
Authors Jonathan Katz, Moti Yung
Comments (0)