Skip to main content

One-Round Authenticated Group Key Establishment Using Multilinear Maps

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 879))

Abstract

In this paper, we propose a one-round authenticated group key establishment protocol. Our protocol is based on Graded Decisional Diffie-Hellman assumption, and it requires timestamps. The resulting solution is in the random oracle model, builds on a multilinear map, and offers integrity as well as strong entity authentication. This proposed construction can also be viewed as a compiler that can transform a passively secure one-round group key establishment protocol to an actively secure one without an additional round.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Barbosa, M., Farshim, P.: Security analysis of standard authentication and key agreement protocols utilising timestamps. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 235–253. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02384-2_15

    Chapter  Google Scholar 

  2. Bohli, J.-M.: A framework for robust group key agreement. In: Gavrilova, M., et al. (eds.) ICCSA 2006. LNCS, vol. 3982, pp. 355–364. Springer, Heidelberg (2006). https://doi.org/10.1007/11751595_39

    Chapter  Google Scholar 

  3. Boneh, D., Silverberg, A.: Application of multilinear forms to cryptography. Contemp. Math. 324, 71–90 (2003)

    Article  MathSciNet  Google Scholar 

  4. Bresson, E., Chevassut, O., Pointcheval, D.: Provably authenticated group Diffie-Hellman key exchange — the dynamic case. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 290–309. Springer, Heidelberg (2001). https://doi.org/10.1007/3-540-45682-1_18

    Chapter  Google Scholar 

  5. Bresson, E., Chevassut, O., Pointcheval, D., Quisquater, J.-J.: Provably authenticated group Diffie-Hellman key exchange. In: Proceedings of the 8th ACM Conference on Computer and Communications Security CCS 2001, pp. 255–264. ACM (2001)

    Google Scholar 

  6. Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8042, pp. 476–493. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-40041-4_26

    Chapter  Google Scholar 

  7. Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)

    Article  MathSciNet  Google Scholar 

  8. Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1–17. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38348-9_1

    Chapter  Google Scholar 

  9. Joux, A.: A one round protocol for tripartite DiffieHellman. J. Cryptol. 17(4), 263–276 (2004)

    Article  MathSciNet  Google Scholar 

  10. Katz, J., Yung, M.: Scalable protocols for authenticated group key exchange. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 110–125. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-45146-4_7

    Chapter  Google Scholar 

  11. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  12. Wu, Q., Mu, Y., Susilo, W., Qin, B., Domingo-Ferrer, J.: Asymmetric group key agreement. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 153–170. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_9

    Chapter  Google Scholar 

  13. Zhang, L., Wu, Q., Qin, B., Domingo-Ferrer, J.: Identity-based authenticated asymmetric group key agreement protocol. In: Thai, M.T., Sahni, S. (eds.) COCOON 2010. LNCS, vol. 6196, pp. 510–519. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14031-0_54

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kashi Neupane .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Neupane, K. (2018). One-Round Authenticated Group Key Establishment Using Multilinear Maps. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3095-7_5

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3094-0

  • Online ISBN: 978-981-13-3095-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics