Multiparty authentication services and key agreement protocols with semi-trusted third party
- 53 Downloads
This paper introduces a new family of group key establishment protocols suitable for small or medium-sized groups. Five protocols are presented, using a semi-trusted server, with varying security service. The first one is a non-authenticated key agreement protocol suitable for applications with low security requirements. The second protocol adds an authenticated key agreement to provide collaborative authentication. The third and the fourth protocols provide key establishment with integrity and confirmation services, and the fifth protocol is the member adding protocol. A major advantage of the protocols is that they reduce the numbers of rounds fromn to 5.
Key wordssecure key establishment authentication group communication
Unable to display preview. Download preview PDF.
- Blom R. Key distribution and key management. InEUROCRYPT’83, Udine, Italy, March, 1983, pp. 34–56.Google Scholar
- Mike Burmester, Yvo Desmedt. A secure and efficient conference key distribution system. InAdvances in Cryptology — EUROCRYPT’94, Damgard I B (ed.),Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1994 pp. 275–286.Google Scholar
- Bennett C H, Brassard G. Quantum cryptography, and its application to provable secure key expansion, public-key distribution, and coin tossing. InInternational Symposium on Information Theory, IEEE Computer Society Press, 1983, p. 91.Google Scholar
- Okamoto E. Key distribution systems based on identification information. InAdvances in Cryptology-Crypto’87, Pomerance C (ed.), Lecture Notes in Computer Science 293, Berlin: Springer, 1988, pp. 194–202.Google Scholar
- Michael Steiner, Gene Tsudik, Michael Waidner. CLIQUES: A new approach to group key agreement. InProc. the 18th International Conference on Distributed Computing Systems (ICDCS’98), Amsterdam, IEEE Computer Society Press, May, 1998, pp.380–387.Google Scholar
- Amos Fiat, Moni Naor. Broadcast encryption. InAdvances in Cryptology—CRYPTO’98, Douglas R. Stinson (ed.), Lecture Notes in Computer Science 773, Springer-Verlag, Berlin, Germany, 1993, pp.480–491.Google Scholar
- Steer D, Strawczynski L, Diffie W, Wiener M. A secure audio teleconference system. I InAdvances in Cryptology-CRYPTO’88, Goldwasser S (ed.), Santa Barbare, CA, USA, Aug., 1990, Lecture Notes in Computer Science 403, pp.520–528, Springer-Verlag, Berlin, Germany.Google Scholar
- Alfred J Menezes, Paul C van Oorschot, Scot A. Vansytone. Handbook of Applied Cryptography. CRC Press Series on Discrete Mathematics and Its Applications, CRC Press, 1997, ISBN 0-8493-8523-7.Google Scholar
- Jean E. Smith, Fred W Weingarten (eds.). Research challenges for the next generation internet.Computing Research Association, Report from the Workshop on Research Directions for the Next Generation Internet, May, 1997, pp.208–217.Google Scholar
- Michael Sterner, Gene Tsudik, Michael Waidner. Diffie-Hellman key distribution extended to groups. InThird ACM Conference on Computer and Communication Security, ACM Press, Mar., 1996, pp.31–37.Google Scholar