Universally Composable Secure Group Communication
نویسندگان
چکیده
This paper analyzes group communication within the universally composable framework. We first propose the group communication model, identity-based signcrytion model and group key distribution model in the UC framework by designing the ideal functionality FSAGCOM , FIDSC and FGKD, respectively. Then, we construct a UC secure identity-based signcryption protocol πIDSC . Moreover, we shows that the identity-based signcryption πIDSC securely realizes the ideal functionality FIDSC if and only if the corresponding protocol IDSC is secure. Finally, based on the identity-based protocol, we propose a group communication scheme πSAGCOM , which can securely realizes the ideal functionality FSAGCOM in the (FIDSC ,FGKD)-hybrid model.
منابع مشابه
Universally Composable Security Analysis of TLS
We present a security analysis of the complete TLS protocol in the Universal Composable security framework. This analysis evaluates the composition of key exchange functionalities realized by the TLS handshake with the message transmission of the TLS record layer to emulate secure communication sessions and is based on the adaption of the secure channel model from Canetti and Krawczyk to the se...
متن کاملUniversally Composable Two-Server PAKE
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret sharing techniques to achieve protection against server-compromise attacks. 2PAKE protocols eliminate the need for password hashing and remain secure as long as one of the servers remains honest. This concept has also been explored in connection with two-server password authenticated secret sharing (2PASS) protocols f...
متن کاملOblivious Transfer in the Universally Composable Security Model
A new promising direction in cryptography, started almost twenty years ago, is the field of Secure Multiparty Computation. In this scenario a set of players want to compute some functions on their inputs, but they don’t trust each other so they don’t want to disclose their inputs to each other. The purpose of this thesis is to investigate the Oblivious Transfer primitive, one of the fundamental...
متن کاملA Simpler Variant of Universally Composable Security for Standard Multiparty Computation
In this paper, we present a simpler and more restricted variant of the universally composable security (UC) framework that is suitable for “standard” two-party and multiparty computation tasks. Many of the complications of the UC framework exist in order to enable more general tasks than classic secure computation. This generality may be a barrier to entry for those who are used to the stand-al...
متن کاملTreading the Impossible: A Tour of Set-Up Assumptions for Obtaining Universally Composable Security
A desirable goal for cryptographic protocols is to guarantee security when the protocol is composed with other protocol instances. Universally Composable (UC) security provides this guarantee in a strong sense: A UC-secure protocol maintains its security properties even when composed concurrently with an unbounded number of instances of arbitrary protocols. However, many interesting cryptograph...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014