One-round Group Key Exchanges from Scratch
ثبت نشده
چکیده
Since the inception of the Diffie-Hellman protocol in 1976, it has been an elusive open problem to construct a one-round group key exchange (GKE) protocol. In this paper, we investigate the open problem and answer it in a modular way. We first revisit the GKE definition and distinguish the conventional (symmetric) group key exchange from asymmetric group key exchange (ASGKE) protocols. In the latter notion, instead of a common secret key, only a shared encryption key is negotiated at the end of the protocol. This encryption key is accessible for attackers and corresponds to different decryption keys merely computable by each group member. We propose a generic construction of one-round static ASGKEs based on a new cryptographic primitive referred to as asteroidal cryptosystem, which is of independent interest. Using bilinear pairings, we instantiate efficient asteroidal cryptosystem and one-round ASGKE schemes. Towards solving the open problem, we show that our one-round n-party ASGKE instantiation implies an (n+1)-party conventional GKE protocol where each member merely broadcasts one message, but the (n+ 1)-th member cannot send its message until it sees the messages of the other n members. By letting the n members distributively simulate the (n + 1)-th member, we propose a one-round n-party GKE protocol in a strict round definition where each member can broadcast its one independent message simultaneously. Hence, one round is sufficient for multiple parties to establish a common secret key from scratch.
منابع مشابه
Round-Optimal ID-Based Blind Signature Schemes without ROS Assumption
This paper presents two Identity-Based Blind Signature (IBBS) schemes based on bilinear pairings. Both of them enjoy the following features. First, they achieve the optimal bound of round complexity for blind signatures, i.e., each signature can be blindly generated with one round (or two moves) of message exchanges between the signature requesting user and signer. Second, their security is pro...
متن کاملIpsec Working Group
This document describes version 2 of the IKE (Internet Key Exchange) protocol. IKE performs mutual authentication and establishes an IKE security association that can be used to efficiently establish SAs for ESP and/or AH. This version greatly simplifies IKE by replacing the 8 possible phase 1 exchanges with a single exchange based on either public signature keys or shared secret keys. The sing...
متن کاملIPSEC Working Group Dan Harkins INTERNET
This document describes version 2 of the IKE (Internet Key Exchange) protocol. IKE performs mutual authentication and establishes an IKE security association that can be used to efficiently establish SAs for ESP, AH and/or IPcomp. This version greatly simplifies IKE by replacing the 8 possible phase 1 exchanges with a single exchange based on either public signature keys or shared secret keys. ...
متن کاملIPSEC Working Group Dan Harkins INTERNET - DRAFT Charlie
This document describes version 2 of the IKE (Internet Key Exchange) protocol. IKE performs mutual authentication and establishes an IKE security association that can be used to efficiently establish SAs for ESP, AH and/or IPcomp. This version greatly simplifies IKE by replacing the 8 possible phase 1 exchanges with a single exchange based on either public signature keys or shared secret keys. ...
متن کاملA Survey of Special Training Round on Performance of Pediatric Residents
Introduction: Clinical settings and teaching methods play a key role in students' learning. So, the present study aimed to investigates the effect of holding special training rounds on performance of pediatric residents. Methods: This quasi-experimental study was conducted on 30 residents. They were randomly divided into two case (n=15) and control (n=15) groups. Two groups received pretest an...
متن کامل