UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Scalable authenticated tree based group key exchange for ad-hoc groups

Desmedt, Y; Lange, T; Burmester, M; (2007) Scalable authenticated tree based group key exchange for ad-hoc groups. In: Dietrich, S and Dhamija, R, (eds.) FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. (pp. 104 - 118). SPRINGER-VERLAG BERLIN

Full text not available from this repository.


Task-specific groups are often formed in an ad-hoc manner within large corporate structures, such as companies. Take the following typical scenario: A director decides to set up a task force group for some specific project. An order is passed down the hierarchy where it finally reaches a manager who selects some employees to form the group. The members should communicate in a secure way and for efficiency, a symmetric encryption system is chosen. To establish a joint secret key for the group, a group key exchange (GKE) protocol is used. We show how to use an existing Public Key Infrastructure (PKI) to achieve authenticated GKE by modifying the protocol and particularly by including signatures.In this paper we recall a GKE due to Burmester and Desmedt which needs only O(log n) communication and computation complexity per user, rather than O(n) as in the more well-known Burmester-Desmedt protocol, and runs in a constant number of rounds. To achieve authenticated GKE one can apply compilers, however, the existing ones would need O(n) computation and communication thereby mitigating the advantages of the faster protocol. Our contribution is to extend an existing compiler so that it preserves the computation and communication complexity of the non-authenticated protocol. This is particularly important for tree based protocols.

Type: Proceedings paper
Title: Scalable authenticated tree based group key exchange for ad-hoc groups
Event: 11th International Conference on Financial Cryptography and Data Security/1st International Workshop on Usable Security
Location: Scarborough, TRINID & TOBAGO
Dates: 2007-02-12 - 2007-02-16
ISBN-13: 978-3-540-77365-8
Keywords: key distribution, group key exchange, tree based GKE, ad-hoc groups, forward security, authentication, anonymity, AGREEMENT, PROTOCOLS, SYSTEM, SECURE
URI: http://discovery.ucl.ac.uk/id/eprint/139131
Downloads since deposit
Download activity - last month
Download activity - last 12 months
Downloads by country - last 12 months

Archive Staff Only

View Item View Item